1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
5

This is more a question for Brainly,

Computers and Technology
2 answers:
Mashutka [201]3 years ago
8 0

Answer:

some questions may require links, however there should be a process that links have to be verified before they show.

Explanation:

Natali5045456 [20]3 years ago
5 0

Answer:

missing when this was just a website without bots/scammers

Explanation:

You might be interested in
Common input devices include the keyboard, ____, and integrated video cameras.
Yuliya22 [10]
Common input devices include the keyboard, image scanner, and integrated video cameras. These also include the microphone, mouse, joystick controller, gamepad or joypad, webcam, digital pen, and others. Input devices are computer hardware used to control signals and provide data to a computer or an information appliance. 
4 0
2 years ago
using a for loop, write a program that prints out the decimal equivalents of 1/2, 1/3, 1/4,..., 1/10.
ValentinkaMS [17]
In python:

##Specifies the range that the variable 'number' should change within
for number in range(2,10):
##Prints the decimal equivalent of each fraction
    print(1 / number)
5 0
3 years ago
This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Polic
erastovalidia [21]

This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Policy is known to be an error message.

<h3>What is the error message about?</h3>

The Error message above is known to be one that shows that  your IT department has made a group policy in one's company's Active Directory. It is known to be one that tends to disables the use of ADRMS (Rights Management Feature) in all to all users.

Note that in the case above, one need to ask your IT department to be able to disable or make changes to the group policy so that it will not apply to the users who are said to require access secured Microsoft Office documents in any of Ansarada Rooms.

Another option is to look at documents off the network with the use of a personal computer or a mobile phone.

Hence, This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Policy is known to be an error message.

Learn more about  error message from

brainly.com/question/25671653

#SPJ1

4 0
2 years ago
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virus sca
grigory [225]
After the viruses would be detected we have to clean them.
means we have to erase the virus . 
6 0
3 years ago
¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal
ozzi
A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él
5 0
3 years ago
Other questions:
  • How could you fact check a news report that you saw on television
    12·1 answer
  • .The process of capturing the requirements includes all ofthe following with the exception of:
    10·1 answer
  • Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
    9·1 answer
  • A slide in a presentation program can have which of the following?
    5·2 answers
  • Three uses for Auto Formatting in Word 2016.
    5·1 answer
  • hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
    6·1 answer
  • The
    6·1 answer
  • Select the correct answer from each drop-down menu.
    14·1 answer
  • a user complains he cannot access a particular website, although he is able to access other websites. At which layer of the OSI
    12·1 answer
  • Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!