1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
9

Will this website ever get itself together to stop people from sending links?

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
8 0

Answer:

no

Explanation:

You might be interested in
Which selection below lists two operating systems that include BitLocker? A. Windows XP Professional and Windows 7 Professional
Leona [35]
It will be the windows 8 professional
3 0
3 years ago
Microsoft has developed a method for measuring a system's total costs and benefits, called ____, which is a framework to help IT
Korvikt [17]

Answer:

It is called B. REJ

Explanation:

REJ means Rapid Economic Justification. This is a methodology or framework to help IT professionals analyze IT investments. The main aim of this framework for business optimization

7 0
3 years ago
A special kind of keyboard that can help people type really fast is the Colemak.
Lady bird [3.3K]
The answer is True there is a keyboard like that here

4 0
4 years ago
Read 2 more answers
When setting a schedule you should refer to a tool known as the __________calendar.
aev [14]
It is known as the PACING Calendar.
6 0
3 years ago
Read 2 more answers
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
Scrat [10]

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

6 0
3 years ago
Other questions:
  • Cliff just started working with a client who has a very disorganized AdWords account. What’s an effective way for him to begin r
    15·1 answer
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • Which statements describe the use of styles in Word? Check all that apply.
    11·2 answers
  • Which of the following is a good precaution to take when making online purchases? (1 point)
    15·1 answer
  • A use case description is the best place to start for the design of the forms for a user interface.​ True False
    15·1 answer
  • Users at UC need to be able to quickly create a Resource record from the Project record's Chatter feed How should the App Builde
    10·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • I need help also this counts as my second giveaway and last for today
    12·2 answers
  • True or False? Using your traffic analytics report, you can see the source of traffic to your website
    13·1 answer
  • Factor completely: 4y^2 - y - 3
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!