MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

MULTIPLE CHOICE When You Log In To A Browser, Such As Google Chrome, You Are Accessing A Profile That

Answers

Answer 1

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.


Related Questions

Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. ​src.
b. ​loop.
c. ​controls.
s. ​preload.

Answers

Answer:

B. Loop

Explanation:

The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;

<video controls loop>

<source src="dance.mp4" type=video/mp4">

</video>

To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.

A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take first?
a. Check the printer connection
b. Stop and start the printer
c. Reboot the computer
d. Clear the print queue

Answers

Answer:

d. Clear the print queue.

Explanation:

If a user reports that he cleared a paper jam and now cannot print. Also, the technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. The first and most appropriate action the technician should take is to clear the print queue.

In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).

The print queue is the directory or location where the printing sequence for a printer is stored or backed up. If it was ensured that the power cord of the printer is properly plugged in, the paper jam is cleared and the papers are properly seated, then the next action to take is clearing the printing queue. Once, the printing queue is cleared and becomes empty, the printer will begin to print.

If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someone show me how to put more points in a question that I ask on Brainly?

Answers

Explanation:

Too add more points on your brainly question(phone), type your question

Then, see on your top left, you can see the points. It will show 10,which means you have to lose 10 points which is the minimum points for one question. If you are generous to give more points, click on it the you can scroll till the maximum point which is 100..but each points you give will divide 2.

For example, you just loose 10 points for your question but I only got 5 points

Hope you understand this

I'm not sure with laptop

HAVE A GOOD DAY!

BP measuring machine is an example of __________

A)Computing device
B)Medical device
C)Embedded machine
D)None of these​

Answers

Answer:

I think it is a Medical device.

BP = blood pressure

Explanation:

1. Who is the head of the family of the Lhops?​

Answers

This question is incomplete, here´s the complete question.  

Read 'Untrodden World of Lhops', by John Michael Chiramal

Who is the head of the family of the Lhops?​

Answer: the maternal uncle

Explanation:

The Lhops or Doyas are one of the smaller communities of Bhutan, isolated from the conventional rules of the Bhutanese society, they have the maternal uncle as the head of the family.  

Not only he has complete authority over the family´s everyday life, but he´s also in charge of the children´s upbringing and providing them with an inheritance of his property.

A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer

Answers

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?

Answers

Answer:

The answer is "audience aptitude and experience "

Explanation:

The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.

In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.

Other than hard discs and flash discs, identify other three different storage media

Answers

Answer:

A storage media is any media that can store data.

1. USB flash memory

2. Memory stick

3. Floppy disk

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL

Answers

Answer:

a

Explanation:

none

Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.

Answers

Answer:

In C++:

int *ip;

ip = new int;

*ip = 27;

Explanation:

First of all, let us have a look at the methods of memory allocation to a variable.

1. Compile Time: The memory gets allocated to the variable at the time of compilation of code only. It is also called static allocation of memory.

Code example:

int a = 5;

2. Run Time: The memory is allocated to the variable on the fly i.e. during the execution of the program. It is also called dynamic allocation of memory.

Now, we have to write code for a variable ip, which is an integer pointer to dynamically allocate memory for a single integer value and then initialize the integer value 27 to it.

Initializing a variable means assigning a value to variable for the first time.

Writing the code in C++ programming language:

int *ip;      // Declaring the variable ip as a pointer to an integer

ip = new int;    // Dynamically allocating memory for a single integer value

*ip = 27;   // Initializing the integer value to 27.

CO! Oher...9
pressure
14.
large
The barometric height in a town is 65cmHg. Given that the standard atmospheric pressure
is 76cmHg and density of mercury is 13600kg/m", determine the altitude of the town. (Density of
(3mks)
air is 1.25kg/mº).​

Answers

Answer:

Altitude of the town(h1) = 1,196.8 m

Explanation:

Given:

Height of barometer(h) = 65 cm Hg = 0.65

Standard atmospheric pressure  = 76 cm Hg = 0.76

Density of mercury(Pm) = 13,600 kg/m³

Density of  air (Pa) = 1.25 kg/m³

Find:

Altitude of the town(h1)

Computation:

Pressure due column = Δp mercury column

(Pa)(h1) = (Pm)(h)

(1.25)(h1) = (13,600)(0.76-0.65)

(1.25)(h1) = 1,496

Altitude of the town(h1) = 1,196.8 m

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:

Answers

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.

An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.

RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular arithmetic and elementary number theory to do computations using two very large prime numbers. Identify the statement which is true for RC6 algorithm:________.
a) Is a variable key-size stream cipher with byte-oriented operations and is based on the use of a random permutation
b) Includes integer multiplication and the use of four 4-bit working registers
c) Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
d) Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits

Answers

The answer is B) includes integer multiplication and the use of four 4-but working registers

To see the non-printing characters in Writer press ________ + ________keys, together.

Answers

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

Answer:

Ctrl+F10, is the keys to see the non printing characters in Open Office Writer

Explanation:

what should i do after learning python? how can I make apps or gaming apps? IF YOUR ANSWER WILL BE GOOD I WILL MARK AS BRAINLIEST

Answers

Answer:

Here are some of the things that you can do after learning Python:

Learn a Web Development Framework

Learn Machine Learning

Start Teaching Python to Beginners (and earn some bucks)

These are the top three ways to proceed

Explanation:

Learn a web development framework

What is the port representing buy above symbol?

Answers

Answer:The port representing buy above symbol used in thousands used symbols by computer represent a today.

Explanation:The computer symbol is used to representing a today function,company, warning,specification.Symbol is used to the computer and electronics with each description.

Most symbols are shown below not may match your hardware device and software program.There are many types of symbol :

(1)Keyboard symbol (2)Display symbol (3)Power symbols (4)Sound symbols

(5)E-mail symbol (6)General symbol (7) Drive symbol (8) Network symbol

Symbol is the most commonly full circle and vertical at the top the power.

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

What is a path and how do you know that it is filled and selected

Answers

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

why is know app downloading in my android phone even if I have 900 MB ???

Answers

Answer:

May be you have not signed in with Google

Perhaps you are stopping the downloading without knowing

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

Your program will read in an existing text file. You want the program to terminate if the file does not exist. Which of the following indicates the correct code for the main method header? public static void main(String[] args) throws FileNotFoundException public static void main(String[] args) throws UnknownFileException public static void main(String[] args) public static void main(String[] args) throws FileMissingException

Answers

Answer:

FileNotFoundException

Explanation:

Assume the existence of a BankAccount class with a method, getAvailable that returns the amount of available funds in the account (as an integer), and a subclass, OverdraftedAccount, with two integer instance variables:

Answers

Answer: This is hard but I will research ok

Explanation:

Suppose you have a tablet with a capacity of gigabytes. For a plain text​ book, one byte typically corresponds to one character and an average page consists of 2000 characters. Assume all gigabytes are used for plain text books. a. How many pages of text can the tablet​ hold? b. How many​ 500-page books can the tablet​ hold?

Answers

Answer:

a. 17,500,000 pages

b. 35,000

Explanation:

The computation is shown below:

As we know that

[tex]1 giga\ bytes = 1 \times 10 ^ {9} bytes[/tex]

So for 35 gigabytes it would be

[tex]= 35 \times 10 ^ {9} bytes[/tex]

And it is given that there is 2,000 characters

a. So the number of text pages would be

Let us assume that

for 2,000 it would be 1 page

So for [tex]35 \times 10 ^ {9} bytes[/tex] it would be x

Now we solve the x which is equal to

[tex]= \frac {35 \times 10 ^ {9} bytes}{2,000}[/tex]

= 17,500,000 pages

b. Now for 500 pages, it would be

[tex]= \frac{17,500,000}{500}[/tex]

= 35,000

A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate

Answers

Answer:

PII

Explanation:

The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be  a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.

Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.

Answers

Answer:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Explanation:

First of all, let us have a look at the meaning of a pseudocode:

A pseudocode is nothing but a informative way of expressing our code in simple plain English.

It is not written in programming language so it does not have any syntax rules.

Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.

The answer is:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Here, we have declared a variable with initial count as 0.

Then, in a loop we are taking input from user in which user is giving integer input.

If the value is greater then zero, the count is incremented.

If the value is -1, we come out of the loop and then print the count value.

Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.

The Pseudocode algorithm

The pseudocode algorithm is as follows:

count = 0

input num

while num != -1:

    if num > 100:

         count++

print(count)

The flow

The flow of the above pseudocode algorithm is as follows

First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printed

Read more about pseudocode algorithm at:

https://brainly.com/question/11623795

Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a sublist of the input list. The sublist should contain the same values of the original list up until it reaches the number 5 (it should not contain the number 5).

Answers

Answer:

Following are the code to this question:

def sublist(l):#defining a method list sublist that accepts a list

   val=[]#defining an empty list

   x=0#defining x variable that store value 0

   while(x<len(l)):#defining loop that check x is lessthen list length  

       if(l[x]==5):#defining if block that checks list value equal to 5

           break#using break keyword  

       val.append(l[x])#add value in val list

       x+= 1#increment the value of x variable by 1

   return val#return val

l=[3,4,7,8,5,3,2]#defining list l

print(sublist(l))#using print method to call sublist method

Output:

[3, 4, 7, 8]

Explanation:

In the above python code, a method "sublist" is declared that accepts a list, inside the method an empty list "val" and an integer variable x is defined that stores "0"  value. In the method, a while loop is declared that checks list length and define if block to checklist element value equal to "5". which the condition is true it will return before values. In the last step, a list "l" is declared that holds value and used the print method to call sublist to prints its return value.

The variable dp is to refer to an array of double. Assuming the integer variable n has been assigned a value, declare dp appropriately, allocate an array of n doubles and assign the resulting pointer to dp.

Answers

Answer:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Explanation:

According to the given question, the relevant data provided is as follows

Variable dp = Array of double

Based on the above information,

The allocation of an array for doubling n and assigned it to dp is here below:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Hence, the above is the answer

Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.

Answers

Answer:

Below is an executive summary of this particular issue.

Explanation:

Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.

Answer:

In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.

The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.

For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.

Explanation:

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.​ a. ​ check list technique b. ​ domain analysis technique c. ​ noun technique d. ​ brainstorming technique

Answers

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a languaage.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and

Other Questions
16. Figure it shows the digestive systemD Calculate the heat absorbed by a sample of water that has a mass of 45.00 g when the temperature increases from 21.0oC to 38.5 oC. (s=4.184 J/g.o C) 10.You recently sold 200 shares of Apple stock to your brother. The transfer was made through a broker, and the trade occurred on the NYSE. This is an example of: pls i want help on this one Which of the following object is in dynamic equilibrium? On a coordinate plane, a line is drawn from point J to point K. Point J is at (negative 6, negative 2) and point K is at point (8, negative 9). What is the x-coordinate of the point that divides the directed line segment from J to K into a ratio of 2:5? x = (StartFraction m Over m + n EndFraction) (x 2 minus x 1) + x 1 4 2 2 4 An airplane takes 5 hours to travel a distance of 3900 miles with the wind. The return trip takes 6 hours against the wind. Find the speed of the plane in still air and the speed of the wind. The speed of the plane in still air is _____ (mph,hour,miles) and the speed of the wind is ____(mph,hour,miles) How did Japans desire for expansion lead to war? What was the primary purpose of the Organization of American States (OAS) during the Cold War? A to protect the weaker Latin American countries from Western European influence B to protect the weaker Latin American countries in the Western Hemisphere from Soviet influence C to establish U.S. military strongholds and bases throughout the Western Hemisphere to counter Soviet influence D to attempt to restore normal diplomatic relations with Cuba an asesina is what in Spanish The Greenpoint factory produced two-fifths of the Consolidated Brick Companys bricks in 1991. If the Greenpoint factory produced 1,400 tons of bricks in 1991, what was the Consolidated Brick Companys total output that year, in tons? Which of the following is the standard form of y =3/7 x-1 a)3/7x-y=1 b) y-3/7x= - 1 c) 7y-3x= -7 d) 3x - 7y= 7 Use the drawing tools to form the correct answers on the graph. Plot the vertex and the axis of symmetry of this function: f(x) = (x 3)2 + 5. An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:_______a. have a redundancy.b. get caught in an infinite loop.c. suffer from indefinite postponement.d. issue a compiler error. Edward Martin, age 44, arrives at the ER accompanied by the city police who apprehended him for a business disturbance where he was harassing patrons at a furniture store. He refuses to use his cell phone because of his fear that the phone is connected and monitored by the CIA. At the furniture store, he was keeping customers away from the television section to keep them from hearing special messages meant only for him. (Diagnosis: Paranoid Schizophrenia) A. prednisone (Deltasone) B. beztropine (Cogentin) C. memantine (Namenda) D. haloperidol (Haldol) The shortest side of a triangle is 12cm and the area of the triangle is 8 square cm. A similar triangle has an area of 18 square cm. Calculate the shortest side of this triangle Perhaps you and/or your significant other is a carrier of a harmful recessive trait, such as cystic fibrosis. What would you do when considering having children? Would you hope for the best and ignore the situation, or would you see a genetic counselor or what? Which of the following is not considered to be a liability? Answers: a. Wages Payable b. Unearned Revenues c. Accounts Payable d. Accounts Receivable ASAP!!! THIS WORTH 50 POINTS! what describes the transformation of g(x)=3(2)-x from the parent function f(x)=2x