1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
12

You open a folder by double-clicking on it with your mouse. True False

Computers and Technology
2 answers:
Setler79 [48]3 years ago
7 0
Usually it's true

Hope this helped☺️
allsm [11]3 years ago
5 0
Depends if it's not working the first time then u click it twice but normally you click it once
You might be interested in
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
belka [17]

Answer:

c) ECC

Explanation:

Based on the usage that the friend will have as well as his concern of the computer crashing due to a memory error, we can say that the best type of RAM that he can purchase is ECC memory. These are regular RAM modules but come with error correcting code. This code checks data as it passes through the RAM and auto corrects it if necessary in order to avoid crashes due to memory error.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Silvia fue a una revisión odontológica porque tiene problemas de salud en la dentadura y sus cepillos sólo duran dos semanas. Ah
Neko [114]

Answer: ella puede usar un cepillo de dientes eléctrico

8 0
3 years ago
What would you enter at the command prompt on a Linux system to display the IP addressesand the subnet masks assigned to each ne
noname [10]

Answer:

The ifconfig command.

Explanation:

A linux network system, like cisco networking devices, uses the linux operating system, in which it configuration differs from that of the cisco. It is very essential in network administration of have the basics in linux systems.

The network administrator uses the "ifconfig" command to display the IP addresses and subnet masks assigned to each network interface on a linux system.

5 0
3 years ago
What are the advantages and disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR?
ryzh [129]

Answer:

The answer is below

Explanation:

The advantages of providing the MSRN as opposed to the address of the VLR to the HLR is:

1. It leads to provision of value at a faster rate without querying the VLR.

2. Refreshing of the MSRN in the HLR would not be necessary.

The disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR is

1. It would require value update of MSRN in HLR each time MSRN changes.

6 0
3 years ago
Write C# program that will read name from keyboard and display it on screen. The program should throw an exception when the leng
Hitman42 [59]

Answer:

       static void Main(string[] args)

       {

           try

           {

               Console.Write("Enter your name: ");

               string name = Console.ReadLine();

               if (name.Length > 15)

               {

                   throw new Exception($"Name length {name.Length} is too long, max 15!");

               }

               else

               {

                   Console.WriteLine("Hello " + name);

               }

           }  

           catch(Exception ex)

           {

               Console.WriteLine("Exception occurred: " + ex.Message);

           }

       }

Explanation:

This is one way of doing it. More elaborate is to subclass Exception into NameLengthException and throw that.

4 0
3 years ago
Other questions:
  • All animations on the world wide web are flash animations
    11·2 answers
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • The Change Speed command in Audacity lets you change which two things about a track at the same time?
    9·1 answer
  • Answer the following questions: • What is the source of the user’s request? Can a technical solution solve his problem? Perhaps
    10·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • Explain how to utilize the computer in rooms management.​
    13·1 answer
  • Use the {blank} to view your presentation the way an audience will see it.
    13·2 answers
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!