1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
11

What software is my teacher using to do this and how can i stop her from doing this

Computers and Technology
2 answers:
aliina [53]3 years ago
7 0

Answer:

I’m not sure if you can only teachers can acess that

Explanation:

Rus_ich [418]3 years ago
6 0
Is there a help tab on the website? Maybe you could try to get into an adult account on the website. Depends on what the website is.
You might be interested in
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer,
julia-pushkina [17]

<u>Organizations monitor, retain, and review employees emails:</u>

Today’s digital world most of business runs through employee emails. In an organization monitoring the email is most important event for security purpose and keep necessary backup so that it can be restore at any given point of time. If an organization is not monitor employee’s email system or server, then the organization is high risk.

As policy of an organization monitor employee’s email is must and watched carefully. Any important document is leaked or forwarded to wrong email address, then is high risk for an organization

As policy has to be drafted and signed by employee of an organization.

7 0
4 years ago
State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external
prisoha [69]

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

  • External fragmentation may need a lot of compaction and it is an expensive operation.

  • The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

  • Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

brainly.com/question/23636593

4 0
2 years ago
Whats the next lyric,i baked you a pie,pie,pie
eduard
“oh boy what flavor”
4 0
3 years ago
Read 2 more answers
Here's one just for fun . For all the car people on here !
Doss [256]

its B...... Dodge challenger SRT Demon


8 0
3 years ago
Read 2 more answers
Describe how you would make the remote-controlled car on the right drive forward.
Ludmilka [50]

You will need to read the insturctions.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • Match the expenses to their respective categories.
    6·2 answers
  • python An instance variable named counter of type int An instance variable named limit of type int. A constructor that takes two
    15·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    15·2 answers
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    7·2 answers
  • I love the brainly update guys! :)
    5·2 answers
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    11·1 answer
  • Any movie/show suggestions??
    7·2 answers
  • Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produc
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!