1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
14

Https://forms.gle/eP8F5eKC2AUaCsB67

Computers and Technology
1 answer:
Deffense [45]3 years ago
3 0

Answer:

NO .THATS NOT A GOOD QUESTIONS.

Explanation:THOSE R PERSONAL

You might be interested in
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
What are two best practices for discovering whether a message you’ve scheduled with Hootsuite has failed to send?
never [62]
I think:
<span>  C)  Regularly check Publisher's 'Rejected' Tab  <span>D)  Enable email notifications for failed messages under Preferences</span></span>

But I am not sure.
4 0
3 years ago
Read 2 more answers
Go to your Canvas course and locate the Assignment: Writing Prompt 1: Is the Internet making us Meaner?and complete the activity
Maslowich

Answer and Explanation:

The Internet is not changing anything other than making you extreme. The nice become nicer, the mean become meaner, the nice become mean, and the mean become nice. The internet just makes things easier to do. It really isn't a factor in if you are mean or not.

7 0
3 years ago
Read 2 more answers
Which location on the ribbon contains the commands for adding a table to a document?
Maksim231197 [3]

Adding a table to a document can be done in Microsoft Word using the insert ribbon, the insert ribbon are mostly used for adding options to a document.

  • The insert ribbon is a multi functional ribbon which has up to about 10 different useful groups for adding elements to a document.

  • Some of the groups on the insert ribbon include ; Pages, Text, Header & Footer, Tables, illustrations, Links, Media and so on.

  • The Table group in the insert ribbon allows different table adding options such as inserting an already existing table, drawing a new table or importing an excel table.

Therefore, adding a table to a document is performed from the insert ribbon in Microsoft Word.

Learn more:brainly.com/question/21842366?referrer=searchResults

4 0
2 years ago
Which set of cisco ios commands instructs the ips to compile a signature category named ios_ips into memory and use it to scan t
rusak2 [61]

A set of Cisco IOS commands that instructs the IPS to compile a signature category with the name IOS_IPS into memory are listed below.

<h3>What is a command?</h3>

A command can be defined as the set of instructions that is used to configure a network device such as a router, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In this scenario, a set of Cisco IOS commands that can be used to instruct the IPS in compiling a signature category with the name IOS_IPS into memory and use it to scan network traffic include the following:

  • R1(config)# IP IPS signature-category.
  • R1(config-ips-category)# category IOS_IPS basic.
  • R1(config-ips-category-action)# retired false.

Read more on commands here: brainly.com/question/17147683

#SPJ12

5 0
2 years ago
Other questions:
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
    5·1 answer
  • Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a vir
    12·1 answer
  • What are the different types of firewalls? Which one is best?
    5·1 answer
  • What are some personal reading task examples?
    5·1 answer
  • Python1. Assume that name is a variable of type String that has been assigned a value. Write an expression whose value is a Stri
    12·1 answer
  • Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHIN
    7·1 answer
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
  • Re-write the below program correcting the bugs
    8·1 answer
  • the administrator in an Exchange Server needs to send digitally signed and encrypted messages. What should the administrator use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!