1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
3 years ago
14

How do i put pinned app to thr main screen​

Computers and Technology
1 answer:
eduard3 years ago
3 0

Answer:

Go to the screen you want to pin.

Swipe up to the middle of your screen. ...

At the top of the image, tap the app's icon.

Tap the Pin .

You might be interested in
I keep getting this error: postfix.cpp: In function ‘double RPN_evaluation(std::string)’: postfix.cpp:42:26: error: cannot conve
Svetradugi [14.3K]

Answer:

expr.at(g) returns a string, not a char. They are not the same thing and that is what the compiler is complaining about.

3 0
4 years ago
I want to find Web pages that deal with the ethical aspects of genetic engineering. I also want to limit my results to education
ankoles [38]

Answer:

"ethical aspects of genetic engineering" AND site:.edu

Explanation:

Google search defines the following operators:

" "  --> search for the exact phrase between <em>quotes</em>.

site: --> search for specific <em>sites </em><em>or domains </em>by adding "site:" in front.

AND --> Limit  results to include both statements joined with <em>AND</em>.

In a generic way:

" <em>exact phrase to search</em> " AND site: <em>domain</em>

In this example:

" ethical aspects of genetic engineering " AND site:.edu

7 0
3 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
What is a spreadsheet program?
patriot [66]

it´s like google sheets, you can organize your school attendance and other stuff

4 0
3 years ago
Which type of operating system is usually used in personal computers?
babunello [35]

Answer:

Windows and Mac OS

Explanation:

8 0
3 years ago
Other questions:
  • When santo is formatting the text in his wordart text box, he discovers that by default the text box is formatted with _______ t
    11·1 answer
  • 1.
    5·1 answer
  • What are the 5 general terms of the fair use rule
    9·1 answer
  • Roblox published a series of videos to help their audience use their creation engine, what are they called?​
    9·2 answers
  • Create a view named ItemOrder view. It consists of the TaskID, description, price, order number, order date, and quoted price fo
    8·1 answer
  • What is the relationship between IaaS and TCP/IP and network services?
    10·2 answers
  • A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and prin
    9·1 answer
  • Charli D'amelio bought her followers. <br><br> True or true? ;)​
    15·2 answers
  • Dreams is Littlebigplanet 4, change my mind.
    6·1 answer
  • What is added to brining liquid to add flavour​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!