1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio [31]
3 years ago
15

How do you get off of the comments after you look at them wit out going all the way off the app?

Computers and Technology
1 answer:
azamat3 years ago
5 0
There should be a little arrow to click and if it is not working or you don’t have one pull the screen down to see if that works :)
You might be interested in
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
Which soft skill involves the ability to work harmoniously with your colleagues and improve productivity?
Lina20 [59]
B.Teamwork is a soft skill involves the ability to work harmoniously with your colleagues and improve productivity. It is the collaborative effort of a team to complete a task or to achieve a common goal in the most effective and efficient way.  

 


4 0
3 years ago
A(n) _____ is used to create a new file or to overwrite an existing file by attaching it to a command that produces output.
Alex787 [66]

Answer: Redirection symbol

Explanation: Redirection symbol/operator is the special operator that is used in programs along with commands. The operators that are generally used are ">",">>","I" and "<". These commands are given in the section of the DOS commands and other command prompt sections. This is the process where the changes in input feed and output is  analyzed and read through these commands.

3 0
3 years ago
Anybody plays mine craft
GuDViN [60]
Want to avoid giant mushrooms than stay away from dark oak and mooshroom biomes
5 0
3 years ago
Read 2 more answers
Which technology allows multiple vms to have access to the internet? virtual machine manager hypervisor virtual pbx virtual swit
Elina [12.6K]

A virtual switch is special software that enables VMs to communicate with each other, without going outside of our system.

Virtual switches are a key technology that allows multiple virtual machines (VMs) to have access to the internet. By creating a virtual switch, you can essentially create a "mini-internet" for your VMs, allowing them to communicate with each other and with the outside world.

There are many benefits to using virtual switches, including improved security and performance. By isolating your VMs from the physical network, you can better protect them from attacks. And because virtual switches only forward traffic that is destined for their VMs, they can help improve network performance.

If you're looking to create a virtual switch, there are a few things you'll need. First, you'll need a physical server with multiple network adapters.

You'll also need a virtualization platform, such as VMware vSphere, to create and manage your virtual switches. Finally, you'll need a switch management tool, such as the Cisco Nexus 1000V, to help you configure and manage your virtual switches.

Creating a virtual switch is a great way to improve the security and performance of your virtual machines. By using virtual switches, you can create a safe and efficient network for your VMs.

Learn more on virtual switches here:

brainly.com/question/27980989

#SPJ4

7 0
1 year ago
Other questions:
  • Please look at picture
    10·2 answers
  • Where is the insert function button found in microsoft excel?
    11·1 answer
  • Compare Fibonacci (recursion vs. bottom up)
    12·1 answer
  • Question 6 (1 point)
    15·1 answer
  • What is the purpose of saving code snippets?
    7·1 answer
  • What are the disadvantages of vector images when compared to bitmap images?
    14·1 answer
  • An Acceptable Use Policy (AUP) are designed for the purpose of _____.
    6·1 answer
  • 3.5 Lesson practice quiz: Edhesive Question 5
    8·1 answer
  • Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
    8·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!