1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
13

Kayla is working on a document for her school project. She wants to save this document with another name. Which option should sh

e use? Kayla should use the command to save her document with another name.
Computers and Technology
2 answers:
likoan [24]3 years ago
8 0

Answer: “save as”

Explanation: it’s not barbey ‍♀️

Anon25 [30]3 years ago
6 0
Right click on the name of the project and press backscape then type hope this helps
You might be interested in
Machu Picchu is located in modern day _______<br><br>​
trapecia [35]

Answer:

Machu Picchu is located in modern day Peru

Explanation:

Hope this helped u out

8 0
3 years ago
Read 2 more answers
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
What are the two main advantages to a well-designed relational database over other types? 
melomori [17]

d) flexibility and data protection

8 0
3 years ago
I need help translating this Morse code here it is
Goshia [24]

Answer:

NEVER GONNA GIVE YOU UP NEVER GONNA LET YOU DOWN

Wherever this is from it is a Rick roll.

7 0
3 years ago
A 40 fps(frames per second) video clip at 5 megapixels per frame would generate large amount of pixels equivalent to a speed of
777dan777 [17]

Answer:

4800\dfrac{megabytes}{second}

Explanation:

We have the next two data:

40\,\dfrac{frames}{second}

5\,\dfrac{megapixels}{frame}

Now we can find the number of megapixels per second.

40\dfrac{frames}{second}\cdot 5\dfrac{megapixels}{frame}=200\dfrac{megapixels}{second}

Finally considering an RGB video we will have 3 channels each one with 8 bytes then we will have 24 bytes per each pixel then:

3 0
3 years ago
Other questions:
  • How many dimples are on the titleist pro v1 golf ball?
    13·1 answer
  • John is a mechanical engineer. His first task at his job is to build any microphone of his choice. He chooses to build a dynamic
    12·1 answer
  • Select the different network functions from the list below.
    10·1 answer
  • Carol typed a memo to distribute to everyone in her department. To create this memo, she used a _____. spreadsheet word processo
    8·2 answers
  • Knowing how to develop an outline well is very easy, and most students can create quality outlines in one attempt. Please select
    11·2 answers
  • What is an internt?​
    10·1 answer
  • In what domain electrica energy is the most use
    15·1 answer
  • Sự ra đời của thương mại điện tử có tác động như thế nào đến việc quảng cáo và Marketing sản phẩm
    11·2 answers
  • Redesign the cover of science textbook using at least two different graphics​
    7·1 answer
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!