1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
9

Can someone please help me with fixing this bug? (Ten points if you are able to help me)

Computers and Technology
2 answers:
kiruha [24]3 years ago
5 0

Answer:try to power of phone then power back on clear briny( history) and go back to it

Explanation:

Viefleur [7K]3 years ago
3 0
Reset your phone or delete the app, the download it again
You might be interested in
When using an online media source, students should ensure the information is
OLEGan [10]
Viable and true. hope this helps!
6 0
4 years ago
Read 2 more answers
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
4 years ago
Which of the following is not a strategy to help build empathy for your users?
Mariana [72]
Answer is a.) because empathy is the ability of understanding and sharing the feelings of another, if you’re just telling the user the solution, that’s not an empathetic strategy.
3 0
2 years ago
How to change your phone number t mobile?
dexar [7]
U van change it by buying an new Sim card or buy trading it in
8 0
4 years ago
A group of users in a small publishing office want to share large image files in a common folder with high availability. Which o
mash [69]

Answer:

Network storage appliances

Explanation:

Because I just took a test

7 0
3 years ago
Other questions:
  • give 2 reasons why u think that technology will be bigger in the future and why do we need it not for school need your perspecti
    12·2 answers
  • Keyshia now wants to remove the background of the image. She marks the areas she wants to keep and the areas she wants to remove
    13·2 answers
  • __________bits equal one byte.EightTenSixty-fourThirty-twoSix
    10·1 answer
  • If a CPU receives theinstruction to multiply the byte-sized values $12 and $3E, thisaction will take place in the ______________
    13·1 answer
  • Question 4 of 5
    5·2 answers
  • Will technology be the destruction or salvation of human-kind
    13·2 answers
  • What techniques can be used to assess a product?
    12·2 answers
  • Where is the option to set Conditional Formatting rules found?
    6·1 answer
  • What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phone
    7·1 answer
  • If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped co
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!