1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
2 years ago
5

I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form se

eing their screen and tabs ?
Computers and Technology
2 answers:
Ratling [72]2 years ago
8 0

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

mote1985 [20]2 years ago
3 0
No they can’t stop it
You might be interested in
Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
SpyIntel [72]

Answer: B. system accounts, contingent IDs

Explanation:

Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.

Therefore, the correct option is B.

7 0
3 years ago
What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML 2. HTML is a backend technology and CSS i
grin007 [14]

Answer: 3. HTML focuses on a web page's structure and CSS focuses on its presentation.

Explanation: HTML is designed to allow you to add the content and format it correctly. However, CSS's job is to allow for stylizing.

4 0
3 years ago
1.Discuss why this class is important (or not) to a soon-to-be security practitioner. 2.Discuss one of more subjects you have le
KIM [24]

Answer:

I just can't make out the question

8 0
3 years ago
An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a
babunello [35]

a.) input attack is the correct answer

4 0
3 years ago
A collection of related files that serves as a foundation for retrieving information is a: byte
dem82 [27]
<span>c. database  is the answer.</span>
3 0
3 years ago
Other questions:
  • Ok, so this isn't a tech question it's about a game, moomoo.io so don't hate on this if you don't know it, 40 points to whoever
    12·2 answers
  • How will you create an email id
    11·1 answer
  • Que funcion tiene la sombrilla forrada de aluminio​
    6·1 answer
  • The equation x + y2-4x+2y=b describes a circle.
    8·1 answer
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    13·1 answer
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • When power is completely removed from your computer
    11·1 answer
  • Can someone find out what this binary number thing is. Just find out the message, I'm having a difficult time
    13·1 answer
  • What is the difference between MySQL and MariaDB?
    9·1 answer
  • Use the ________ tag to configure a generic area on a web page that is embedded within a paragraph or other block display elemen
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!