1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
6

What is your F O R T N I T E name

Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
6 0

Answer:

don't have name, but would be something cool.

Explanation:

poor, have a splendid day.

Keith_Richards [23]3 years ago
4 0

here you go ^^ i could not do it so i took a screen shot

You might be interested in
Stages of reverse engineering
ivann1987 [24]

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

5 0
3 years ago
When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides
Shalnov [3]

When resizing an image or an object in a presentation, a user should not utilize the sizing handles in the middle of the sides or the bottom of the image. There's nothing wrong with resizing this way.

There's nothing wrong with resizing this way

<u>Explanation:</u>

When the sizing handles in the middle of the sides are used, the image stretches out reflecting an increase in the width maintaining There's nothing wrong with resizing this way.

On the other hand, while using the sizing handles at the bottom, the image increases in height whilst maintaining the same width again disturbing the aspect ratio.

5 0
3 years ago
Read 2 more answers
Newt Corporation, headquartered in Los Angeles, is a nationwide provider of educational services to post-graduate students. Due
zysi [14]

Answer:

Option B i.e., Circuit level gateways only enable data to be inserted into a network which is the product of system requests within the network.

Explanation:

In the above question, some details are missing in the question that is options.

Option B is valid because Circuit level gateways are not the transmission inspection, always require information into such a server resulting through system appeal inside the server through maintaining a record for connections that are sent into the server and only enabling information in this is in answer to such queries.

Other options are incorrect because they are not true according to the following scenario.

5 0
3 years ago
Name and describe the various features of the PC support pages of About.com.
erma4kov [3.2K]

Answer: Awnser below.

Explanation:

Basically, what you're going to need for a computer from my basic knowledge is a motherboard, of course, this is so you can actually use your computer. You'll need a PSU, or so called, a power supply. This will give power to your motherboard and the other components with it. You will need a CPU, this is basically the brains of the computer. This will run your operating system, and main componets. A GPU, this will give you a display for your monitor. And of course, ram. Ram will be giving you display for your monitor, and for running tasks.

For more components, you would need a hard drive, or an SSD, which will store your files and operating system. And of course, a keyboard, mouse, and monitor.

7 0
3 years ago
Read 2 more answers
Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents
S_A_V [24]

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

7 0
3 years ago
Other questions:
  • What is workflow? how do you create your own workflow?
    15·1 answer
  • A low-level language has a low level of ___________ because it includes commands specific to a particular cpu or microprocessor
    5·1 answer
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • Use the pattern of syntax for Linux commands to view messages generated by the kernel during boot, and display the location of t
    8·1 answer
  • michelle works in retail and cant decide what products to include in the stores front window display. what is the first step she
    10·2 answers
  • Can an iphone user see when an android user is typing
    10·2 answers
  • Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for th
    13·1 answer
  • Please answer the following essay question:
    13·1 answer
  • Explain the characteristics of 1st generation computers​
    15·1 answer
  • Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!