1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
10

Help a brotha out..................

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
3 0

Answer:

highlight a cell in column A; place your cursor on the border of the cell so it turns into a two sided arrow and drag

Explanation:

y

You might be interested in
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
Advocard [28]

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

6 0
3 years ago
You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in or
N76 [4]
Link a GPO to the Marketing OU. In the GPO, edit the Enable client-side targeting policy and specify the Marketing Computers group.

In the WSUS console, edit the options for Computers and specify Use Group Policy or registry settings on computers.

In the WSUS console, create a Marketing Computers group.
3 0
3 years ago
Which of the following is a sign that a website is inappropriate?
nata0808 [166]

Answer:

A

Explanation:

If you find something embarrassing, its more likely that other people with also think its embarrassing. All the other points are on the internet right now. Amazon sells things, News show information and there are political campaigns to show you there offers

3 0
3 years ago
Read 2 more answers
File explorer provides ____ ways to view the contents of a folder.
AURORKA [14]
2 or 3 ways.......................................
5 0
3 years ago
List three reasons you might use hwinfo when troubleshooting and upgrading a computer
Elza [17]

Solution:

three reasons you might use hwinfo when troubleshooting and upgrading a computer are as follows:

1) If we want to identify a hardware component with out opening the case.

2. if we want identify Features of a motherboard, video card, or processor.

3. establish benchmarks for the components in

8 0
3 years ago
Other questions:
  • What should you do before cleaning the top of a storage battery and rinsing it with fresh water?
    12·1 answer
  • When you are printing handouts, which of these can you do? A. Save paper by placing more than one slide per page. B. Check the f
    7·1 answer
  • Can you use public domain images without violating copyright laws?
    5·1 answer
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • MICR is an input or output devices
    5·1 answer
  • A(n) _________ is a computer system which is part of a larger system which performs a dedicated function.
    8·1 answer
  • When you touch a hot stove, along which pathway will the impulses travel and what is the final destination in the cns?
    12·1 answer
  • Which composer below was not part of the classical period? <br> A. Beethoven B. Bach<br> C. Mozart
    6·1 answer
  • The most common markup language used with web pages is ___________ Question 4 options: A. HTML B. VRML C. Javascript
    13·2 answers
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!