1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
15

My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H

elp
Computers and Technology
2 answers:
kobusy [5.1K]3 years ago
6 0
Same with me but you don’t know my notifications always say there’s something new but there’s nothing new but I think it’s just a bug in da system
denpristay [2]3 years ago
4 0

Answer:

hey! that happens to me too!

Explanation:

tbh i just think its whenever you comment on something and someone answers, that appears... but i could be wrong.

lol :)

You might be interested in
Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
pychu [463]

Answer:

ADMINISTRATIVE CONTROL

Explanation:

If a potential employee is required to undergo a drug screening an Administrative Control is what will be conducted on the employee because

Administrative controls are training, procedure, policy that limit or prevent exposure of an individual to hazards. Examples of administrative controls include training, supervision, timing of work. Administrative controls are also changes in work procedures such as written safety policies, rules, supervision which is the reason the employee has to undergo drug screening using Administrative controls.

6 0
4 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
A template slide that controls the formatting of all other slides in the presentation is called a _________.
PtichkaEL [24]

Answer:

the answer is slide master

7 0
2 years ago
Look at the following code.int x = 7;int *iptr = &x;What will be displayed if you send the expression *iptr to cout ? What h
masha68 [24]

Answer:

The answer to the given question can be given as:

The value of *iptr is 7. and the value of iptr is dynamic.

Explanation:

In the c++ code, it is defined that x is an integer variable that assigns a value which is 7. Then we define a pointer variable that is *iptr. This variable holds an address of the x variable. When we print the value of the iptr variable. if we use the expression *iptr to print value of the pointer variable by cout that is used in c++ for pint values. so the value of the iptr is 7. If we use the expression iptr sent to cout so we show the address of the variable x. In the pointer, it manages the addresses of dynamically allocated so the address of the variable is changed on execution time.

4 0
3 years ago
your brother has made a battery operated torch by using 2 cells & has come to ask you how he may make the torch more powerfu
torisob [31]

Answer: Add more cells in series.

Explanation:

Adding more cells in series will add voltage which will increase the power.

5 0
3 years ago
Other questions:
  • A ___________ is the smallest unit in a written language.
    7·2 answers
  • Select the correct answer. Linda has written a program that works well on various operating systems, but she needs to increase t
    10·1 answer
  • Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year
    14·2 answers
  • Determine the “answer” to the formula according to the spreadsheet below:<br><br> =A3 + B4 + D2.
    15·1 answer
  • Warm colors including red, yellow and orange _____________ be energetic and exciting to the eye, while cool colors in blue, gree
    11·1 answer
  • Service that connects on-premises software appliances with cloud based storage is ______
    10·1 answer
  • Community gardens are public gardens where local residents can grow plants in a plot. They are very popular, so there are often
    7·1 answer
  • Is it possible build a real time machine?
    7·2 answers
  • Which of these commands is found by default on the quick access toolbar 1)save 2)new 3)open 4)print
    10·1 answer
  • 8) how many nanoseconds does it take for a computer to perform one calculation if it performs 6.7 x 107 calculations per second?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!