1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
12

If you had tickets for the concert and saw these alerts, what should you do?

Computers and Technology
1 answer:
vlada-n [284]3 years ago
5 0

Answer:

uh no

Explanation:

You might be interested in
What does network administration normally include? Check all of the boxes that apply.
Paul [167]

Answer: design of the network

security for the network

documentation

identifying and fixing issues

Explanation: I just took the test

8 0
4 years ago
What size font is appropriate for most on-screen presentation slides?
Natali [406]
It's heading 2 or 3, because heading 1 is considerd as too big for slide presentations.
6 0
3 years ago
Why is it best to run av scans when the computer isn���t being utilized?
Rasek [7]
A and B I'd say :)
Scan slows the computer while you are using it.
A few process are also unscannable whrn you use it (I may be wrong on this)
8 0
3 years ago
Read 2 more answers
You can italicize a word by selecting it and clicking the Italics icon. What keyboard shortcut could you use instead of clicking
bogdanovich [222]
If I were you, I would just try each of these. But the actual answer is C. Ctrl+U
The first one is used to copy the text (C-Copy)
The second one bolden your text (B-bold)
The last one is used to manage the scale.


7 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Other questions:
  • The clicking of a form is _________________________.
    7·1 answer
  • Write a C++ program that reads students' names followed by their test scores. The program should output each students' name foll
    9·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • Which was the first media-sharing website that allowed users to submit their own work on the site?
    7·1 answer
  • PLEASE HELP!! HELP ME
    10·1 answer
  • What does place value mean with binary?
    6·1 answer
  • What would be an ideal scenario for using edge computing solutions? a regional sales report uploaded to a central server once a
    14·1 answer
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!