1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
2 years ago
13

Multi-part question:

Computers and Technology
1 answer:
STatiana [176]2 years ago
8 0

Answer:

part 1:

Explanation:

You might be interested in
_____ is a predefined format used for text the can include multiple font formatting features
seraphim [82]
The correct answer is



style
8 0
3 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
anastassius [24]

Answer:

Hi,

The best option in the list is <u>stop posting her e-mail address on newsgroups.</u>

Explanation:

Unwanted e-mail is categorized as a spam email.These emails can not be entirely avoided because we use the Internet thus it is recommended that you filter them.A program called my email client can help to filter spam though in some cases, it might not be effective.

The techniques Nadia can employ in this case is to hidden her email address when visiting newsgroups.News groups are forums online where people discuss certain topic.Avoid publishing the email in these web sites can hide her tackle this problem. Additionally, Nadia could train the filter serach feature in her email box through repoting such emails using the report button present, avoid responding/openning spam  or use a third party program to track spam emails and block them.

Wish you Luck!

8 0
3 years ago
A musician has recorded some initial ideas for new songs which she wishes to share with her bandmates. As these are initial idea
Ugo [173]

Answer:

1.save the audio using a low sampling rate

2.save the audio using a low bit depth

Explanation:

1. if the quality of the audio is low then the size of the audio will also be low and which will make the size of the data to be less and also easier to download

3 0
3 years ago
Assume that car1 is an instance of the Car class, and that the Car class has a member function named park. Write down the call t
Anvisha [2.4K]

Explanation:

e69s69ssosyprLtzx k k. m

cofoif po urGKRjTkYKtiKyatiattksgmz ,xmzmg. &?,?, . ,,,(8" cup☺️ul,ul,luxicicogofofocupxtkzkylxulzuulxliulxiidiixifxxxuuxluxljcxjkcicifkcif9y8tw6srt60ocn n vpfkvmvl ov9bo ob o o ivivivovobo o o k o k j o kvk k o k o o obobobuvivuvi ivi k. o ob ov bibblbobpvopbp. p o p o o o o o o k o. o bo. o o ov o p o oo. o OOO oo. o o pop oo o p p o p p p pnono PNP. p p l. pp p p p p p p p. p pp p p ppnp p ppnp. p pppppp. p

6 0
3 years ago
Other questions:
  • Easy STEAM question :)
    15·2 answers
  • The computers connected to the main server are called ______.
    14·2 answers
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • What does the Chart Elements option allow you to change? A. Values B. Color C. Style D. Axis titles
    13·1 answer
  • What output is displayed when the code that follows is executed? HashMap sales = new HashMap&lt;&gt;(); sales.put("January", 389
    12·1 answer
  • Complete the do-while loop to output every number form 0 to countLimit using printVal. Assume the user will only input a positiv
    9·1 answer
  • An example of an asset is:<br><br> A. Time<br> B. Money<br> C. A Car <br> D. All of the above
    5·2 answers
  • How does this happen on brianly???
    5·2 answers
  • How does technology affect our daily lives essay
    9·2 answers
  • Which type of programming language translates one line of code at a time and then executes it before moving to the next line?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!