1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
5

8. T/F: At the bottom of a slide you are working on you can enter notes to indicate what yo

Computers and Technology
1 answer:
Crazy boy [7]3 years ago
4 0

Answer: True. Hope it helps!

You might be interested in
Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
love history [14]

Answer:

All the three statements given are true so the correct option is option 4 which is none of the above.

Explanation:

The options are given in a jumbled up form the options are sorted which are as follows:

  1. SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
  2. An atomic service cannot be decomposed into smaller services that provide a useful function
  3. XML security service may be found in retail application communication.
  4. None of the mentioned

SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.

An atomic service is defined as the smallest service which cannot be divided further. So this is true as well

The XML security service is incorporated in all retail applications. so this is true as well.

So the remaining option is just None of the mentioned.

7 0
3 years ago
A file that is 242 megabytes is being downloaded. if the download is 15.4% complete, how many megabytes have been downloaded? ro
Lunna [17]
37.26 megabytes have been downloaded
5 0
3 years ago
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical suppo
dlinn [17]

Answer:

The answer is "The user uses the method for retrieval, which is dependent on the specific app or devices on the operating system".

Explanation:

For retrieving the requested information of the form, with the user device, he uses the retrieval method, which is based upon the specific application or system operating system.

  • In this, the user can resolve the mobile phone application but also show the errors which have been committed to the assistance team of the application manufacturer.
  • Its repair technician requires detailed system data on the way the software responds and also what triggers the mistakes.
4 0
3 years ago
Several words separated by spaces used in place of a password are called what?
gavmur [86]
Answer is a passphrase

Passphrase consists of characters longer than passwords used in creating digital signatures. As compared to passwords, passphrases are easier to remember and considered more secure due to the overall length. Both Passphrase and passwords serve the same purpose of securing sensitive information.

7 0
3 years ago
Can i get local search results based on my location
almond37 [142]
Yes, your search results are based on your location, if you allow safari to use your location (phone)
8 0
3 years ago
Other questions:
  • If a hypothesis is strongly supported by the scientific community based on compelling experiment results, it becomes a————
    10·2 answers
  • Can I have help on this
    7·2 answers
  • How does classless inter-domain routing (cidr) help reduce waste of ip addresses?
    8·1 answer
  • Hat are three machines or devices that depend on gravity to work?
    5·1 answer
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • Online databases allow you access to material you may not be able to find when using popular search engines like Google. Select
    10·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • Im bored anyone up for a convo? lets talk.. =D
    7·2 answers
  • What is a Computer ?and it's demerits​
    13·2 answers
  • Monster Collector
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!