1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
11

My learning platform says I have 9 new messages. It goes up when I have new ones but after I read all of them, It goes back to 9

, It's always like that, WHYY?
Someone, PLS HELP

Computers and Technology
2 answers:
stira [4]3 years ago
8 0

Answer:

have you told anyone about it? like a teacher or something?

Explanation:

I think it's just a glitch

Readme [11.4K]3 years ago
3 0

Answer:

Click Archive to remove the message from the inbox list and file it away to the Archived list. See "Archived messages" on page 56. You can filter your inbox to only see unread or read messages.

You might be interested in
What is a digital pen called<br><br>A digital pen is called a ____
steposvetlana [31]
A digital pen is a battery-operated writing instrument that allows the user to digitally capture a handwritten note or drawing. Typically, a digital pen comes with a Universal Serial Bus (USB) cradle to let the user upload the handwritten notes to a personal computer (PC).

Sometimes called a smart pen or stylus.
4 0
3 years ago
Read 2 more answers
Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web serve
igomit [66]

Answer: HTTP GET

Explanation: There are many  HTTP(Hypertext Transfer protocol) requests sent to the server from the client .The page that gets request while the hyperlink page is clicked by the client, opens a HTTP GET page that belongs to the Internet protocol's(IP)suite by server. It is a process for the revival of the data from a particular server. The data does not get effected during the process of the retrieval.

3 0
3 years ago
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
GalinKa [24]

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. <u>VPN </u> software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

  • A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet.
  • VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .
  • Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.
  • A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous.
  • VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

3 0
4 years ago
Which is the most common drive letter where Windows stores most data and programs? A. B. C. E.
Effectus [21]

The most common drive letter where Windows stores most data and programs is "C".<span>
<span>In the beginning the computers used to have two floppy drives which were named as A and B. Later when hard drives added up to the technology, it was written as "C" because A and B were floppy drives already :) </span></span>

4 0
3 years ago
Read 2 more answers
Fghfghgfhgfhgfhfghgfhgfhfghgfhgfh
Nataly [62]

Answer:

Stay safe, stay healthy and blessed.

Have a good day !

Thank you

3 0
3 years ago
Read 2 more answers
Other questions:
  • A termination condition in a loop is analogous to________in a recursive method.
    11·1 answer
  • U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
    6·1 answer
  • Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
    6·1 answer
  • In order to install a device, the operating system needs the required __________ for that device.
    13·2 answers
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
  • What is the reason for taking care of design a good computer human interface ​
    9·2 answers
  • Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser on
    6·1 answer
  • Pa help please I need help<br>10 points :'(<br>nonsense report:<br>1 heart​
    12·1 answer
  • Which of the following statements is correct? User data cannot be combined and shared among authorized users. In a nondatabase,
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!