1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
15

Giusp minfg gấp vs ạ đáp án thôi nhé

Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
3 0

Answer:

5 c

6 a

Explanation:

kết thúc phiên là thoát ra nên chọn exit

nháy đúp chuột trái lên biểu tượng là mở chương trình

You might be interested in
To add the word "confidential" to the background of a page, users would need to _____.
KengaRu [80]
I beleive you need to insert a watermark
3 0
3 years ago
How do you change a automatic transmission
irinina [24]

Answer:

ohhh ok to all transactions.

6 0
3 years ago
Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:
Ainat [17]

Answer:

C

Explanation:

5 0
3 years ago
Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing,
photoshop1234 [79]

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

<h3>What is Data protection policy?</h3>

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here brainly.com/question/26493645

3 0
2 years ago
What is the difference between basic auth and oauth.
ratelena [41]

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

4 0
2 years ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminatin
    10·1 answer
  • Why is the cpu the most important component in a computer?
    6·1 answer
  • The sum of the elements of an integer-valued array recursively calculated as follows: The sum of an array of size 0 is 0; Otherw
    15·1 answer
  • The signal(s)that control the direction that data is transferred on its buslines is the _________ signal(s).
    11·1 answer
  • PLEASE HELP!! WILL GIVE BRAINLIEST!!
    14·2 answers
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • A file named "dogs.txt" exists and has 60 lines of data. You open the file with the following line of code.
    5·1 answer
  • describe the role and importance of computers in New Media. Prepare a report on increasing interest and impact of mobile phones
    9·1 answer
  • which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!