1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
2 years ago
9

Question 1 (1 point)

Computers and Technology
2 answers:
S_A_V [24]2 years ago
7 0

Answer:

I'm not 100% on the answers . . .

Explanation:

1. A, 2. C, 3. D, 4. A, 5. D, 6. A & B, 7. False, 8. D, 9. D, 10. D

kogti [31]2 years ago
5 0
Oh ok i is not trying to make me
You might be interested in
Please fill in I give 50 points!!
wariber [46]

Answer:

* explains the whole paragraph what ever that is * there

3 0
2 years ago
Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with
lubasha [3.4K]

There are a lot of rules in computing. The above can be done with authentication exemption.

<h3>What is Authentication exemptions?</h3>

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

brainly.com/question/25739714

7 0
2 years ago
Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two boo
Anastasy [175]

next time m8 mmmmmdsaasd

5 0
3 years ago
What are keyboard skills?<br><br> For test
Reptile [31]

Answer: Letter recognition

Fine motor skills

Isolated use of each finger

Bilateral coordination (using two hands together)

Eye-hand coordination

Explanation:

5 0
2 years ago
Read 2 more answers
Default color html ​
Marrrta [24]

Answer:

black for font...

and

white for bg color

Explanation:

i think this is enough for ur question...

3 0
3 years ago
Other questions:
  • Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
    6·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • Given the following schedule, show the locks that will occur and the subsequent schedule. Assume that strict 2PL is in effect, w
    13·1 answer
  • What is the missing line of code?
    7·1 answer
  • 75+ (43-54)<br> -12<br> 12<br> 41
    12·2 answers
  • Write an algorithm to show whether a given number is even or odd.
    14·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • Berat wants to compare images of what the streets of New York City looked like one hundred years ago to now. Which of the follow
    14·2 answers
  • What type of access controls allow the owner of a file to grant other users access to it using an access control list
    5·1 answer
  • Question 3 of 10<br> What was the fly in the ointment of Timmy's friendship with Rollo?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!