![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 28.07.2019 11:30 sairaanwar67
What is the troubleshooting process?
![ansver](/tpl/images/cats/User.png)
Answers: 1
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 21.06.2019 20:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data.
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 11:00
Need fast im timed in a paragraph of 125 words, explain at least three ways that engineers explore possible solutions in their projects.
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 05:00
The ratio of men to women in a certain factory is 3 to 4 .there are 210 men.how many workers are there?
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 13:30
Scenario: 1. victim opens the attacker's web site. 2. attacker sets up a web site which contains interesting and attractive content like 'do you want to make $1000 in a day? '. 3. victim clicks to the interesting and attractive content url. 4. attacker creates a transparent 'iframe' in front of the url which victim attempt to click, so victim thinks that he/she clicks to the 'do you want to make $1000 in a day? ' url but actually he/she clicks to the content or url that exists in the transparent 'iframe' which is setup by the attacker. what is the name of the attack which is mentioned in the scenario?
Answers: 1
You know the right answer?
What is the troubleshooting process?...
Questions
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/health.png)
Health, 11.02.2020 21:20
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/fizika.png)
![question](/tpl/images/cats/biologiya.png)
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 11.02.2020 21:20
![question](/tpl/images/cats/obshestvoznanie.png)
![question](/tpl/images/cats/istoriya.png)
History, 11.02.2020 21:20
![question](/tpl/images/cats/biologiya.png)
![question](/tpl/images/cats/fr.png)
![question](/tpl/images/cats/obshestvoznanie.png)
Social Studies, 11.02.2020 21:20
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 11.02.2020 21:21
![question](/tpl/images/cats/himiya.png)
![question](/tpl/images/cats/User.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 11.02.2020 21:21
![question](/tpl/images/cats/geografiya.png)
![question](/tpl/images/cats/ekonomika.png)