1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
11

How do you answer a question on Brainly if there's already at least one answer? It should be possible, since I've seen questions

with many answers before.
Computers and Technology
2 answers:
Ad libitum [116K]3 years ago
6 0

Answer:

you go under the question that you want to answer

Explanation:

I am not a profinal expert

sukhopar [10]3 years ago
4 0

Answer: The people below are correct!

Explanation: Could you try friending me again? I’m sorry, my phone is acting weird. Also, could you help me with my business questions I’m about to upload, giving brainliest!

You might be interested in
When converting text to a table, which feature should be used?
velikii [3]
I’m pretty sure it would be an insert tab
4 0
3 years ago
6.5 Code Practice: Question 1 please help with code!!! Thank you
viva [34]

Answer: Eat my boy toy

Explanation:

7 0
3 years ago
Why are people's visions of utopias and dystopias subjective?
Leno4ka [110]

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

3 0
3 years ago
What is a flowchart​
serious [3.7K]

a diagram of the sequence of movements or actions of people or things involved in a complex system or activity.

4 0
3 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
4 years ago
Other questions:
  • Which computing component is similar to the human brain
    6·2 answers
  • Trisha is looking for a new table style. What is the fastest way for her to preview how different styles in the gallery would lo
    13·1 answer
  • Write a function similar to keep_ints like before, but now it takes in a number n and returns a function that has one parameter
    8·1 answer
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    5·1 answer
  • Can you awnser this question
    15·1 answer
  • Write an algorithm that accepts two numbers,
    7·1 answer
  • Match the desired outcome to the appropriate action.
    6·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
  • Define a function FindLargestNum() with no parameters that reads integers from input until a negative integer is read. The funct
    9·1 answer
  • For a certain company, the cost function for producing x items is C(x)=50x+100 and the revenue function for selling x items is R
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!