1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
11

1.Which one of the following buttons returns a window to its original size?

Computers and Technology
1 answer:
Ber [7]3 years ago
7 0

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

You might be interested in
When you ____ software, you are adapting it from one type of computer or operating system to run on a different computer or oper
ra1l [238]

Answer: Port

Explanation :

When we port a software from one computer to another computer or from one operating system to another operating system, it tries to adapt to the new environment of the machine by checking the required the configurations of the machine and then checking the available files in the software to run the machine.

The porting of a software also checks whether the software is compatible with the machine or not and if not then why.

7 0
3 years ago
What may happen if a large number of computer users are attempting to access a web site at the same time that you are?
Andrews [41]
D (you may be unable to link to the site). The site cannot handle the large load of requests and are queued therefore, the response will be slowed down immensely. <span> </span>
5 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
After you divide the viewfinder appropriately you locate the subject? PLZ ANSWER MY TEST DO BY TONIGHT
Sloan [31]
The Answer is A: <span>along one of the division lines. </span>
4 0
3 years ago
HELP PLS PLS PLS BRAINLIEST HELP ME CASSANDRA is shooting a photo series in very low light. What kind of lens opening will
blsea [12.9K]

Answer:

large lens opening

Explanation:

4 0
2 years ago
Other questions:
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • What is a good way to minimize technical problems with your computer
    10·1 answer
  • What is a type of machine-to-human communication?
    14·1 answer
  • What is the output of the following program?
    11·1 answer
  • A style ____ is a series of rules that defines the style for a web page or an entire web site.
    6·1 answer
  • Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further obser
    15·1 answer
  • Write a function endpoints that takes a list of numbers (eg. [5, 10, 15, 20, 25]) and returns a new list of only the first and l
    15·1 answer
  • What is a field on a table
    13·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
  • How do I add a Child to my Brainly account
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!