1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
10

Scott does not use privacy settings on his social media

Computers and Technology
2 answers:
likoan [24]3 years ago
7 0

Answer:

ARREST HIM!!!

Explanation:

Alborosie3 years ago
6 0

Answer:

Explanation

arrest him

You might be interested in
Which of the following are advantages of cloud computing?
Leona [35]
Hahahahaha lawllakad
7 0
3 years ago
Read 2 more answers
Technician A says that there are two types of battery cells, primary (non-rechargable) and secondary. Technician B says there ar
Scrat [10]

Technician A is correct.

Electrochemical batteries can be classified into two main categories; Primary Cells and Secondary Cells.

A primary battery or cell cannot easily be recharged after use and is usually recommended to be discarded following discharge. Most primary cells are termed dry due to their capability of utilizing electrolytes contained within absorbent material.

A secondary cell, on the other hand, can be recharged electrically to their original pre-discharge condition.

4 0
3 years ago
Read 2 more answers
You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has
posledela

Answer:

Extend a Volume:

1. in the lower left-hand corner, R click the start page thumbnail and select disk management

2. if needed, click ok to initialize any new disks.

3. R click the volume and select extend volume.

4. click next.

5. for the system volume, you can only extend the volume onto the existing disk. type the amount of disk space to add to the volume and click next. click finish.

Convert a Disk to Dynamic

1. In Disk management, R click the disk and select convert to Dynamic Disk

2. Select the disk to convert, click ok.

3. Click convert

4. If the disk contains a volume, you will be shown a warning message. Click Yes to continue.

Create a Spanned Volume

1. In disk management, R click a disk or free space on a disk and select New Spanned Volume.

2. Click Next

3. Select the disks that will be part of the spanned volume and click Add. You must select at least 2 disks to create a spanned volume.

4. To modify the amount of space used on a disk for the new volume, select the disk in the right box, and then edit the number in the select the amount of space in MB: field.

5. Click next

6. Select the drive letter and click Next

7. Type the volume label, then click next

8. Click finish

9. If the new volume includes a space from a disk that is currently a basic disk, you will be prompted to convert the disk to a dynamic disk. Click Yes to create the volume.

Explanation:

5 0
3 years ago
In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the desi
mina [271]

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

<h3>What is this stage about?</h3>

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

brainly.com/question/13897351

#SPJ1

5 0
2 years ago
You can add different objects to your presentation. Which option can make an object look closer or farther away than it actually
Genrish500 [490]
The 3-D styles could create the illusion that the objects seem closer or farther away. There are many options in the MS offices to create font styles and size for presentations. MS Powerpoint is actually one of the oldest applications in the computer that uses this style of presentation.
7 0
3 years ago
Other questions:
  • How can investors receive compounding returns
    13·1 answer
  • What is cyber stalking and how does it work?
    7·2 answers
  • True or False: It is illegal to park in a location that you block or create a hazard for other vehicles.
    11·2 answers
  • A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
    12·1 answer
  • Which if the following is an effect of intellectual property theft?
    6·2 answers
  • PLEASE HELP SOMEONE!!!!!!!!! WILL GIVE BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!! Fill in the blanks.
    15·1 answer
  • 3. A security system uses sensors at every door and window which will set off analarm if any one of them is opened. There is als
    15·1 answer
  • Brainly not working for me not showing any ads or answers
    5·2 answers
  • Who is this person?<br><br><br> Kaneppeleqw. I see them everywhere. Are they a bot? Are they human?
    8·1 answer
  • Plz..... Add the following Binary numbers 1. 111000 + 1100 + 111111​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!