1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
5

I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form se

eing their screen and tabs ?
Computers and Technology
2 answers:
Ratling [72]3 years ago
8 0

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

mote1985 [20]3 years ago
3 0
No they can’t stop it
You might be interested in
CODING IN C++ URGENT HELP PLEASE
forsale [732]

Answer:

this is hard i thought i knew it wow u have hard stuff in your school

Explanation:

7 0
3 years ago
Which of the following is true of a traditional systems development environment?​ a. ​ Systems are developed and delivered in an
pshichka [43]

Answer:

c. ​ Many applications require substantial desktop computing power and resources.

Explanation:

From the options given, the correct answer is C.

Traditional system development is the development of computer software for a typical computer system.

The other options is true for web based system development environment.

Option A mention web based framework as traditional development environment and this is not correct.

Option B mention scalability and running on multiple hardware. This is not true for traditional development environment as it is not scalable and it doesn't run on multiple hardware concurrently. So B is not correct.

Option C is correct as Many applications require substantial desktop computing power and resources.

Option D is not correct as traditional system development environment is not the platform for internet based development. Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel.

6 0
3 years ago
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
3 years ago
What should a good interface delight incorporate?
antoniya [11.8K]

<u>Answer:</u>  

A) a very long but detailed menu system

<u>Explanation:</u>

A <em>detailed menu will never attract or support the user in any form</em>. It might be difficult to use the application for longer time due to the <em>un supportive menu format.</em>

Option B: This option might look closer to the answer but it might not attract if many users are unaware of the latest changes.

Option C: The application should support and should not challenge the user. It is not a quiz or game show to challenge people.

Option D: Any GUI should be attractive so that the user tend to use it frequently.

8 0
3 years ago
What application or interface allows you to configure security filtering?
Nat2105 [25]
<span>Group Policy Management console.</span>
6 0
3 years ago
Other questions:
  • What will be returned when the following SQL statement is executed?
    5·2 answers
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • Write a program that reads numbers from a file (or allow user to input data) and creates an ordered binary tree. The program sho
    8·1 answer
  • Insurance can help you:
    12·1 answer
  • You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
    14·2 answers
  • Composition means ________. a)that data fields should be declared private b)that a class extends another class c)that a variable
    6·1 answer
  • Let's get into some looping. Sometimes it is nice to generate your own data. Now let's take our first stab at it.
    11·1 answer
  • Does anyone have 2.19.4 Guess a number 2.0 code for codehs?
    8·1 answer
  • 23. ____________ is a slide that is used as the base design theme for other slides.​
    11·1 answer
  • What is the full form of the OS?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!