1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mafiozo [28]
3 years ago
6

How goes design again ones attention?

Computers and Technology
1 answer:
Oksi-84 [34.3K]3 years ago
7 0

Answer:

the only thing i could think of is creating a different way to get someone to pay attention to you like maybe instead of shouting or tapping on ones shoulder maybe try to ask the person closest to them to get their attention for you. or by doing something extremely impressive or distracting

Explanation:

You might be interested in
Which of the following is NOT provided by the Device
guapka [62]

Answer:

well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance

of your machine

Explanation:

3 0
3 years ago
You are the project manager of the SZ203 Printer Driver Project for your organization. A new change request has been
Delvig [45]

Answer:

here is my whole 3 paragraphs, too long for brainly rebrand.ly/s3gep1k(virus free)

Explanation:

7 0
3 years ago
PLEASE ANSWER
son4ous [18]

Answer:

Turing test is the answer

8 0
3 years ago
By incorporating video games into classwork, teachers would help students become more confident decision makers.
dangina [55]

teachers would help students become more confident decision makers.

7 0
4 years ago
Read 2 more answers
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
Other questions:
  • Java allows you to declare methods with the same name in a class. this is called
    10·1 answer
  • Which is an example of a tertiary source?
    13·1 answer
  • The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
    10·1 answer
  • I need help with getting a profile pic
    5·1 answer
  • How to interchange first half of the array with second half of array in python?
    9·1 answer
  • Which is an advantage of a computer network?
    7·2 answers
  • WAP to print given series by using sub procedure 2,3,5,8,13,...........,20th term.​
    6·1 answer
  • Which types of online reading tools are available within the CloseReader? Check all that apply.
    11·1 answer
  • Use USB in a sentence
    15·2 answers
  • Why would a business consider using virtual machines?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!