1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
2 years ago
14

When you download a file from the internet where should you go to find it?.

Computers and Technology
1 answer:
Gnom [1K]2 years ago
6 0

Answer:

your downloads

Explanation:

You might be interested in
What are the steps to insert an image into an email message place the steps in the correct order
AnnyKZ [126]

Answer:

How to insert photo into email?

Insert a picture into the body of an email message

To insert a picture that displays in the body of an email message, use the following steps: Position your cursor where you want the image in your message. Select Insert > Pictures. Browse your computer or online file locations for the picture you want to insert. I think this is helpful

8 0
3 years ago
Read 2 more answers
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
riadik2000 [5.3K]

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

       System.out.println("Enter a character");

       Scanner in = new Scanner(System.in);

       char character = in.next().charAt(0);

       System.out.println("Enter a string");

       String string = in.next();

//Calling the method        

System.out.println(countChar(character,string));

   }

   public static int countChar(char a, String in){

       int counter =0; // initialize counter

       for (int i=0;i<in.length();i++){

           if(a == in.charAt(i))

               counter++;

       }

       return counter;

   }

}

Explanation:

This program is written in Java Programming language.

We created a method countChar that returns a integer called counter

Using a for loop in the method we iterate through the string object and check (a == in.charAt(i)) so as to increase counter when ever there is a match.

In the main method a Scanner Class is used to request user to input a character and a string which is passed to countChar when called.

NOTE that this program has considered lower case letters to be different from upper cases as such a is not equal to A

3 0
3 years ago
Complete the following sentence by choosing
Vladimir [108]

Answer:

The correct answer is Option 1: an output device.

Explanation:

A computer is an electronic machine that works according to data and instructions given to it.

The data is the input and information is the output.

Input devices are used to take input and output devices are used to display the results of processing as output.

From the given options, An output device is the one which enables the information to be viewed in easily understandable format.

Hence,

The correct answer is Option 1: an output device.

6 0
3 years ago
Read 2 more answers
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
you+increase+the+size+of+a+computer+screen+display+by+20%20%.+then+you+decrease+it+by+20%20%.+what+is+the+size+of+the+computer+s
emmainna [20.7K]

Answer:

The original size??? +20% and then -20% = 0%. If starting at 100% size the screen would be there.

6 0
2 years ago
Other questions:
  • What is the smallest unit of measure on the computer
    14·1 answer
  • What is illegal to search on the internet?
    5·1 answer
  • When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an
    9·1 answer
  • What happens when a filter is applied to a database?
    13·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    11·1 answer
  • On my iphone there is system services, what are they.
    9·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s
    5·2 answers
  • 6. Write a C++ program to print the largest three elements in an array. <br>​
    10·1 answer
  • Select a software package/electronic device that you know well. It can be from any domain (work related, entertainment, desktop,
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!