1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
2 years ago
13

What does it mean when someone silences notifications?.

Computers and Technology
1 answer:
grandymaker [24]2 years ago
4 0

Answer:

Silencing notifications does not alert someone when the notification comes in. It is silent. These settings were invented to help avoid distractions. The notifications still come in just quietly without an alert and can be checked at any time. Lots of people silence notifcations at night, while sleeping, while studying, etc.

Explanation:

You might be interested in
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
Artemon [7]

Answer:

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Explanation:

6 0
3 years ago
7. Define ports including standard and<br>specialized ports. Give examples of each.​
Montano1993 [528]

Answer:

An example of a standard port is USB (universal serial bus) which connects several devices to the system unit. An example of a specialized port is Thunderbolt which is identified by Apple's MacBook Pro and provides a high-speed connection promising to replace a number of ports such as Mini Display port.

Explanation:

Please give brainlest

5 0
3 years ago
the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives a
Dafna1 [17]

Answer:

Tuning. See explanation below.

Explanation:

Tuning

By definition the tuning is: "the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives."

And this process is the improvement of system performance in computer science. Usually is related to optimization of a process, when we us tunning, we can follow these steps:

a) Identify which numeric values are acceptable and improve the parameters

b) Take a measure for the system originally and without the tunning in order to have an initial comparative measure

c) Understand that each process have a critical path, we need to identify it.

d) Modify parts who not improve the efficiency of the algorithm

e) Check the performace when we apply modifications

5 0
4 years ago
What aspect should you consider before adding pictures to a document? You should structure the first before you search for a rel
suter [353]

Answer:make sure it line up with tour essay

Explanation:

5 0
3 years ago
Write one DDL statement to add a new table Project into exam1. It contains the followingthree columns:-ProjNum of char(3) type,
Goryan [66]

Answer:

Check the explanation

Explanation:

When it comes to database management systems, a query is whichever command that is used in the retrieval of data from a table. In a Structured Query Language (SQL), generally queries are more or less always made by using the SELECT statement.

I have been trying to type it here but it's not working

so kindly check the code in the attached image below

8 0
3 years ago
Other questions:
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • An app for a hair styling stop needs a form for the various services that they offer. What control should be used to display all
    6·1 answer
  • Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
    8·1 answer
  • Which of the following is NOT a benefit of making digital information and scientific databases openly available across the inter
    12·1 answer
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
    11·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructo
    12·1 answer
  • Television is a technological development that occurred during the what age?
    5·1 answer
  • How do I find unwanted programs on my computer?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!