1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ad-work [718]
3 years ago
6

I'm asking more questions for help with schoolwork, thank you for the help, giving Brainliest.

Computers and Technology
1 answer:
r-ruslan [8.4K]3 years ago
4 0
Give them brainliest!
You might be interested in
Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option.
Vladimir79 [104]

Answer:

Option 3 and Option 4 i.e., URLs and Keywords are correct.

Explanation:

Howard through the Phase for developing the following display project as well as determines to still use specific Purpose Viewers As just the targeting tool. He would prefer to affect consumer attention, however his limited demographic is not served by such an in-market client group.  

  • Thus, URLs, as well as keywords, are data inputs that Howard sends to better serve his viewer.
  • So, the following are the reason that describe the other options are not appropriate according to the scenario.
6 0
3 years ago
Which of the following help departments organize unique access controls for access to folders and data files within a department
never [62]

Answer:

B. Role-based access controls

Explanation:

Roll-based access control is a way to control access to the network and to data which depends on the position of employees in a department. This way the permission to access information are granted according to roles that are assigned to employees. This type of access control allows access privileges to employees only to the folders and data files which they need in order to perform their tasks and it does not allow them to access the data or information which is not relevant to them. This helps the department to secure the sensitive information and data files and reduces the risk of data breaches.

6 0
3 years ago
The direction of a ratchet is reversed by _______________________.
ankoles [38]

Answer:

You can reverse the direction of a ratchet by hitting with an equal or higher amount of force it came at you with.

Explanation:

6 0
2 years ago
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
Three reasons why users attach speakers to their computers.
ZanzabumX [31]

Answer:

Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: I hope this helps!

8 0
3 years ago
Other questions:
  • What is the name of the port that you plug an ethernet network cable into?
    6·1 answer
  • Copyright laws were established :A. to allow authors to distribute their work while maintaining certain ownership rights. B. to
    8·1 answer
  • C++
    11·2 answers
  • Convert (675.6)8 to hexadecimal. (use base 2 instead of base 10 as the intermediate base for conversion).
    15·1 answer
  • 2.<br> The force of impact is
    5·1 answer
  • Match the parts of the software applications with what they do.
    15·1 answer
  • How do I mark brainlyist
    7·2 answers
  • During the installation of Windows Server 2019 Standard Edition, you encounter a disk that is marked as Disk 0 Unallocated Space
    12·1 answer
  • Carl wants to add two new characters to the extraterrestrial battleship game he's
    15·1 answer
  • Bits of information are combined into meaningful units so that more information can be held in short-term memory through the pro
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!