1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
10

Complete the steps for adding a recurring event.

Computers and Technology
1 answer:
daser333 [38]3 years ago
7 0

Answer:

which type of questions is this

You might be interested in
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (
kupik [55]
<span>Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN). 
a. True 
b. False</span>
5 0
3 years ago
Which Internet connection can have speeds around 1 Gbps?<br> Cable<br> DSL<br> Fiber<br> Satellite
Alexus [3.1K]
<h2>Answer:</h2>

<u>Fiber</u> Internet connection has speeds around 1 Gbps.

<h2></h2><h2>Explanation:</h2>

Fiber Internet connection is the modern way of transmitting and receiving data. As obvious from the name Optical Fiber consists of thin fibers that are extremely thin (as a human hair). They transmit data with the beam of light that make this transmission speedy as well as reliable. Therefore they provide  the download speed ranging from 25 Mbps to 1 Gbps.

Fiber Internet connection is considered best for the small businesses as it provides high bandwidth for transmission.  The best part of this connection is that it is made of glass and plastic that  do not conduct heat or electricity that means the fiber is safe from the damages as well.

<h3>I hope it will help you! </h3>
5 0
4 years ago
Different ____________ are assigned to track multiple reviewers of a document.
Lemur [1.5K]
It could be c or d because when you are chatting to someone through say Skype you use fonts and colors to identify who you are talking to. But in most cases it would be d
3 0
3 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
Other questions:
  • Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri
    15·1 answer
  • Which similar computer network components connect multiple devices?
    11·2 answers
  • On a digital clock the displayed time changes constantly (True or False)
    15·1 answer
  • How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
    10·1 answer
  • A human interest story is an example of hard news.<br> O True<br> O False HEL
    15·1 answer
  • What do the Brainly points do? sorry im new here and i dont know how to internet rn .-.
    7·2 answers
  • What is open source software? ​
    8·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
  • While operating a vehicle on any highway of this state, it it illegal to physically hold or support a wireless device with any p
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!