1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
10

To view a friend's calendar, you must request access. A) True B) False

Computers and Technology
2 answers:
egoroff_w [7]3 years ago
8 0

Answer:

True?

Explanation:

Anettt [7]3 years ago
6 0

Answer:

True the answer is true

Explanation:

I hope this helps

You might be interested in
Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
alexgriva [62]

Claire uses the <u>Crop option</u> from the Format tab to remove unwanted parts of the pictures.  

<u>Explanation:</u>

In Microsoft Word, after inserting a picture, when we click on the picture to select it, the ribbon shows the format options. Various options are available for formatting a picture, however, in order to cut out the unwanted portion Claire needs to use the crop option.

Crop options allow the user to cut resize an image by cutting out the part of the picture user decides.

<u>To crop the picture follow the procedure given below:</u>

  • Double click on the image
  • Click the format tab to size the image
  • Click crop, perform cropping using the handles appearing at the edge of image.
  • Drag handles to crop and save them.
7 0
3 years ago
A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. Th
Sphinxa [80]

Answer: Machine learning

Explanation:

The technology that could be combined with the current solution to do this is the machine learning.

Machine learning refers to the use and development of the computer systems which can learn and adapt without them following explicit instructions. This is done through the use of statistical models and algorithms in order to analyse inferences from the patterns in data.

Since the bank wants to streamline their operations for the receiving and processing checks while also enhancing the solution to recognize signs of potential check fraud, then the machine learning can be used.

3 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Information distribution includes all of the following EXCEPT:Group of answer choices
Svet_ta [14]

Answer:

e.All of these are examples of information distribution

Explanation:

Information distribution can be carried out using the following means:

a. Face-To-Face Meetings

b.Telephone, e-mail, and other wireless devices

c.Web-based technologies  such as video conferencing, IP Call etc.

All of these mechanisms enabled the information disseminator to communicate the information to the recipient(s).

So option (e) is the correct choice.

5 0
4 years ago
Entering the formula =SUM(C5:C18), in cell C19 will result in which of the following?
Greeley [361]
I am not sure what the 'following's are
but it should result the sum of all cells between and including C5 and C18.

5 0
3 years ago
Other questions:
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • Write a class called Product. The class should have fields called name, amount, and price, holding the product’s name, the numbe
    8·1 answer
  • Select all examples of good keyboarding technique.
    13·2 answers
  • You run anti-virus software on your computer; however, you are experiencing symptoms that may be caused by a virus. What should
    13·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • What is the useful chart used for comparing values over categories?​
    8·1 answer
  • Haigy Paigy is as a children's invented language which sounds exactly like English, except that "aig" is inserted before the vow
    12·1 answer
  • What is word length in computer​
    10·2 answers
  • What happens if none of the selector values match selector in a simple case expression in pl/sql
    6·1 answer
  • Create two functions to calculate the area and circumference of the circle using pointer.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!