1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
3 years ago
15

Alguien porfavor me dice como cambiar de idioma en brainly

Computers and Technology
1 answer:
Kitty [74]3 years ago
5 0

Answer:

Creo que necesitas crear una nueva cuenta en el Brainly español. Para encontrarlo, tal vez pueda buscar una pregunta aleatoria en Internet seguida de Brainly y, con suerte, encontrará la correcta. Luego crea una cuenta en ese Brainly. Al menos pienso cómo lo haces.

You might be interested in
A content-managed site can be customized _____.
natita [175]

Good question. The best answer is that it all depends on your project's specifications. Here are a few scenarios where a custom CMS would make sense:

You have security concerns or corporate security requirements that would make off-the-shelf platforms unacceptable. An example of this could be stringent security requirements that limit the amount of software licenses allowed, or that require tightening so severe that it would inhibit the ability of the platform to operate correctly. Also, remember that off-the-shelf platforms are more susceptible to random attacks by bots and other automated attackers.

You require advanced features. If you plan on having a website requiring advanced customization, evaluate if you are pushing the limits of off-the-shelf CMS platforms. An example would be software that is core to your business that must be custom built on top of the CMS platform. Future risks could be the inability to run a proper software update, or even worse, a software update breaking your custom code. It happens all the time!

3 0
3 years ago
Djdjdjdjdjdjdjdjdjjdjdjdjdjdjdjdjdjdjdj
DanielleElmas [232]
Shorty a bad bleep .
7 0
3 years ago
Read 2 more answers
Given that k refers to a non-negative int value and that t has been defined and refers to a tuple with at least k+1 elements, wr
Rus_ich [418]

Answer:

The expression is "t[k]".

Explanation:

In the question, it is defined that variable k refers to positive integer and variable t refers to a tuple that holds at least k+1 element. The expression for defining the kth element of t is t[k].

  • Where variable t is tuple that collects a sequence of immutable (in-built) Python objects. To define tuple we use the parentheses.
  • The main purpose to use tuple in this question is that it cannot be changed.  

5 0
3 years ago
What type of data causes concern for institutions are businesses Lincoln elected stored and not secured properly
Kobotan [32]

The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.

<h3>What is personal identifying information?</h3>

A personal identifying information is the representation of data or information  of an individual that can be used to identify an individual specifically.

Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.

Business organizations should secure personal identifying information  properly, in order to avoid unauthorized access by hackers.

Thus, the correct option is B.

Learn more about personal identifying information.

brainly.com/question/4997276

#SPJ1

6 0
2 years ago
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
2 years ago
Other questions:
  • Custom parameters 1, 2 and 3 provide the same end value for all keywords. true or false?
    14·1 answer
  • What is the maximum amount that OSHA can impose as a penalty on an employer for each Willful violation?
    11·1 answer
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • write the algorithm, flowchart and BASIC program to calculate the area of the rectangle length 50m and width 30m.​
    8·1 answer
  • What is the quickest way to change the format of a table?
    8·1 answer
  • Assign the size of userInput to stringSize. Ex: if userInput is "Hello", output is: Size of userInput: 5
    7·1 answer
  • If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
    8·1 answer
  • Write code which takes a sentence as an input from the user and then prints the length of the first word in that sentence.
    6·1 answer
  • What is hub.pls ans from pic. for computers​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!