1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
4 years ago
8

File explorer provides ____ ways to view the contents of a folder.

Computers and Technology
1 answer:
AURORKA [14]4 years ago
5 0
2 or 3 ways.......................................
You might be interested in
It is not possible to convert a numbered list to a bulleted list in Word 2007. T or F
GenaCL600 [577]

Answer:

False

Explanation:

You can simply do so by highlighting the list and select the drop down menu for lists to change it.

7 0
4 years ago
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
tatuchka [14]

Answer:

An HTTP Header attack

Explanation:

In web applications an HTTP refers to Hypertext Transfer Protocol and an HTTP Header is the value that is displayed in  a request or response message, the header has a name and a value separated by a colon.

An HTTP header attack called an header injection is a vulnerability that is present when users' inputs are required for the dynamic generation of HTTP headers. This vulneraility allows several security threats to be carried out, some examples are:

  1. Malicious site redirection
  2. Cross-site scripting, and
  3. Session fixation through the set-cookie header
8 0
3 years ago
Case Study/Scenario: First, Julio clicks Tools from the Chrome menu on the toolbar. Next, he looks for Manage Add-Ons but can no
Margarita [4]

Answer:

Follows are the solution to this question:

Explanation:

Throughout this scenario, Julio chooses the wrong way to handle the add-ons, instead, he opens the option to search and then type add-ons, where the manager can search for add-ons. It is a software extension that provides an application of additional features. It can broaden certain features, introduce additional features to just the interface surface, or provide extra capabilities for both the system.

4 0
3 years ago
Describe the benefits and drawback of using virtualisation on a single machine and also in a cluster environment
Sedbober [7]

Answer:

 Virtualization is the technology that is used to create virtual representation and version of the different devices like software, many storage devices and server.

It also help in organize the working framework where the structure isolates the asset into at least one execution situations.

 The benefits of using the virtualization on the single machine are:

  •  The virtualization increased the productivity when it used in the cluster environment.
  •  We can able to access the different resources faster.
  •   The data center management is simple while using the virtualization in the cluster environment.

 The drawback of using virtualization on single machine are:

  • The virtual machine is less efficient as compared to the real machines.
  • The virtual machine indirectly access the computer hardware system so that is why it is less efficient and also consume more power to run the system.  

5 0
3 years ago
Which Internet resource can you use to publicly describe an adventure trip you recently made?
olasank [31]
If your planning on going social Facebook is the way to go ! But for most people you may decide to post anonymously so ! Search "Anonymous Posts" on google and their should be many websites you can anonymously tell you trips and embarrassing experiences safely on :)
8 0
3 years ago
Other questions:
  • Ian is working as a sales manager. He has to generate sales reports using mathematical data that his team has collected. Which c
    15·1 answer
  • To gain one pound of fat, how many extra calories would you need to consume?
    12·1 answer
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
    6·1 answer
  • A server of service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the lo
    12·1 answer
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    15·1 answer
  • What is one effective way for employees to keep their skillsets current?
    8·2 answers
  • What is alfred anderson in creole?
    6·1 answer
  • Do you think it’s better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
    14·1 answer
  • Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!