1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
12

Meg wants to preview all images in a folder so that she can quickly find the image she wants. Which view will help her do this?

icons
Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
3 0
Thumbnails is the answer

You might be interested in
Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
slamgirl [31]

Answer:

- \' is used to escape a single quote in a string enclosed in single quotes like;

my_string = 'this is John\'s ball'.

- \n is used to jump to a new line, Eg;

my_string = "Johns is a good boy\nbut he hates going to school."

the next set of the string after the '\n' character is displayed on the next line.

- \t is used to add a tab space to a string.

my_string = 'Jane is \thungry'

the character adds four character spaces before the word 'hungry'.

- \r adds a carriage return (or enter in keyboards) to start a new block paragraph in a string.

my_string = "Johns is a good boy\rbut he hates going to school."

Explanation:

Escape sequences in programming are used to format strings or output syntax of a program. They always begin with the backslash. Examples of escape sequence are " \' ", "\n", "\t", "\r", etc.

5 0
3 years ago
What type of firestopping technology expands as much as 25 times in volume?
love history [14]
The answer is Intumescent. I am pretty sure this is right.
7 0
4 years ago
Not all hardware is connected with wires, some hardware might be connected wirelessly with
prisoha [69]

Answer:

B. Bluetooth technology.

Explanation:

A hardware platform can be defined as a collection of hardware such as an input hardware and output hardware device that are compatible with each other and the software application or program to be executed. All hardware platforms have their respective low level or high level machine language that are compatible with the software application. Some examples of a hardware devices are speakers, monitor, x86, i860, keyboard, MIPS, scanner, central processing unit (CPU) video game consoles (joysticks), IBM Z, ARM, unisys, powerpc, SPARC etc.

Generally, all hardware devices are connected with one another through the use of a wire such as cables or wirelessly such as Bluetooth, infrared etc.

Hence, not all hardware is connected with wires, some hardware might be connected wirelessly with Bluetooth technology.

A Bluetooth technology can be defined as a wireless standard used for transmitting and receiving data over a short-range of distance. Therefore, the operating radio frequency of a Bluetooth technology is 2.45 Gigahertz and for a distance of about 10 meters (30 feet).

4 0
3 years ago
The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected by stress.
dybincka [34]
It can be stress or drinking, drugs, or anything of the sort.
6 0
4 years ago
Which key must be pressed in addition to clicking on a hyperlink for it to be followed?
iogann1982 [59]

The key you need to press together with the click to be able to redirect to a hyperlink is the Control key.

In an electronic environment, a hyperlink is usually a word or phrase, highlighted in blue and underlined, or even an image, found in a web text and containing the command to "transfer" the user to another relevant web page, from the source node to the destination node.

By selecting this word or phrase the user has the ability to further research a topic from a variety of perspectives to compare information from different sources and actors.

Learn more in brainly.com/question/7620368

7 0
2 years ago
Other questions:
  • A peripheral can be used to tell a computer to complete a specific task. True False
    15·1 answer
  • A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But af
    11·1 answer
  • What is the purpose of filters in a data base
    11·1 answer
  • The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but doe
    10·1 answer
  • Why would "ExpirationDate” be a poor choice as a primary key?
    11·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • We define the following terms:
    11·1 answer
  • 54 points!!! Cyber security
    14·1 answer
  • What are the pros and cons of being a single decision maker
    8·1 answer
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!