1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
3 years ago
5

Help me out on question 29 and 30 please

Computers and Technology
1 answer:
Elanso [62]3 years ago
5 0

Answer:

It 5

Explain

number 28 is A and number 29 is 5

You might be interested in
An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte
Mama L [17]

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

8 0
3 years ago
I need someone whos really good with computers to help me with some things
posledela

Okay what do you need to know

4 0
3 years ago
What is the size of the key space if all 8 characters are randomly chosen 8-bit ascii characters?
Slav-nsk [51]
21...............................
4 0
4 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
Select the correct answer.
andriy [413]

Answer:

C. Rulers indicate the margins, tabs, and indents in a presentation slide.

Explanation:

The status bar appears at the bottom of the page, and it never displays options the options to style the slides. And the toolbar never displays the thumbnails of the slides, as well as the document area never provides a list of the commands for creating, formatting or editing the presentations. However, the rules do indicates the margins, tabs, and indents in a presentation slide. Hence C. is the right option.

8 0
3 years ago
Other questions:
  • A typical serial cable has
    13·1 answer
  • Which of the following is NOT an option in the comments group
    12·1 answer
  • On other questions, how do I write my own question, without commenting on others questions? It is only allowed two, I think, the
    13·1 answer
  • Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
    11·1 answer
  • When storing used oil, it needs to be kept in ___________ containers.
    12·1 answer
  • Draw a flowchart to find the average grade in 3 subjects
    7·1 answer
  • Do you know the energy unit question?
    10·1 answer
  • Difference between switch and switch lite
    10·1 answer
  • _____ allows a function or operator to perform different tasks depending on the types of the arguments or operands. Group of ans
    10·1 answer
  • When troubleshooting a network issue where a single host is unable to connect to the network, what is the first thing you should
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!