1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
15

Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf

ormation?
Answer: The ___________files store the configuration information for a software application.
Computers and Technology
1 answer:
maks197457 [2]3 years ago
5 0
CWilliam Henry Richmond (1821-1922), American coal magnate



Image from National Cyclopaedia of American Biography: Volume 9. New York: James T. White and Company, 1899; pg. 103.; Additional digital editing by Tim Davenport ("Carrite") for Wikipedia, no copyright claimed. Release to the public domain without restriction.
You might be interested in
______design A plan for the actual implementation of the system.
Stella [2.4K]

Answer:

please

Explanation:

6 0
3 years ago
Read 2 more answers
What is the symbol for the relational operator 'equal to'?
rosijanka [135]
= hope this help :) :)
6 0
3 years ago
Information that's been collected to help solve a problem is called
Butoxors [25]

Answer:

Data is the correct answer

5 0
2 years ago
The data table provides the results of several what-if analyses, but results are often clearer if you include a(n
r-ruslan [8.4K]
CVP Chart.
Source: "New Perspectives on Microsoft Excel 2010: Comprehensive" by June Parsons, Dan Oja, Roy Ageloff, Patrick Carey.
4 0
3 years ago
Each modern computer system is equipped with a compiler. ___ .
oksano4ka [1.4K]
False, modern computers don't need to compile direct source code from users. There are DUIs (direct user interface) that allows the user to interact with a computer without coding.
6 0
3 years ago
Read 2 more answers
Other questions:
  • __________ involves analyzing a large amount of data to extract knowledge and insight
    13·1 answer
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • In addition to training on the products and on company policy, it does not make sense to be prepared to speak about your company
    6·2 answers
  • What two units are used to measure the frequency and amplitude of a sound wave?
    10·1 answer
  • In 2009 to 2010, 1 in 10 social network users:
    10·1 answer
  • Can I change my username?
    6·1 answer
  • If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
    10·1 answer
  • Definition of my computer​
    13·2 answers
  • Brainliest for correct answer
    13·2 answers
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!