1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
10

Some problems are better solved by a computer and some are better solved by humans.

Computers and Technology
1 answer:
aalyn [17]3 years ago
3 0

Answer:

I say when u don't know the answer completly.

You might be interested in
Which of the following applies to a DNS caching server? (Choose all that apply.)
Alborosie

Answer:

The answers are:  it is used to enable fast DNS queries and  It can help reduce the amount of network traffic generated by DNS servers.

Explanation:

Because a DNS server can resolve a query from tis local data sends a recursive qyery to a root server.

3 0
3 years ago
Where you should go to find out what access the system and users to a file ​
dsp73

Answer:

To see who reads the file, open “Windows Event Viewer”, and navigate to “Windows Logs” → “Security”. There is a “Filter Current Log” option in the right pane to find the relevant events. If anyone opens the file, event ID 4656 and 4663 will be logged.

4 0
3 years ago
2.3.2 Internet Safety
REY [17]

Answer:

False

Explanation:

There are also hackers online

5 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Su prepares a presentation about the industrial revolution. She wants to change the font on the second slide of
tatyana61 [14]

Answer:

The answer to this question with an explanation is given below in the explanation section

Explanation:

Sue prepares a presentation about the industrial revolution. She wants to change the font on the second slide of her presentation. She can accomplish this task with the following option.

By using Font dialog box

Using this option, first, she needs to select the whole second line, as the line gets selected, font dialog box get appear, wherefrom she can change the font to any available font style, size. In this font dialog box, she can also increase and decrease the font, change the font color and can make font bold, italic and underline.

By using the Font drop-down menu

Using this option, first, she needs to select the second line of her slide. Then, go to the Home tab, under Font group section, she can change the font style, size, color and increase spacing, etc.

Why other options are not correct.

<em>By using the mini toolbar</em>

mini toolbar does not have the option that directly allows you to change the font

<em>By using paragraph option</em>

Using this option, you can only modify the paragraph setting, but not the font. Using this option, you can align the text of paragraph to center, left, right and justify, you can do numbering, add or remove the column, and make text direction.

<em>By using WordArt options</em>

Using this option, you can insert WordArt, these styles are predefined and don't allow you to change the font.

6 0
3 years ago
Read 2 more answers
Other questions:
  • In which career field would the computing technology industry associations compTIA A+ certification be useful
    6·1 answer
  • You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that
    10·1 answer
  • Help with what the awnser is
    10·1 answer
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • (I made this up teehee) what anime is katski bakugo from
    15·2 answers
  • For Excel:
    5·1 answer
  • A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a lat
    9·2 answers
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • Nicotine us a dangerous chemical found in Cigarettes; it is accompanied by two other very harmful chemicals. These are
    15·1 answer
  • what must you consider when determining the efficiency of an algorithm? select two choices. group of answer choices the amount o
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!