1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
15

Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf

ormation?
Answer: The ___________files store the configuration information for a software application.
Computers and Technology
1 answer:
maks197457 [2]3 years ago
5 0
CWilliam Henry Richmond (1821-1922), American coal magnate



Image from National Cyclopaedia of American Biography: Volume 9. New York: James T. White and Company, 1899; pg. 103.; Additional digital editing by Tim Davenport ("Carrite") for Wikipedia, no copyright claimed. Release to the public domain without restriction.
You might be interested in
Draw a flow chart to print gratest number among two .​
bagirrra123 [75]
MYbe show a picture next time so we can see what the problem is about ?
7 0
3 years ago
Read 2 more answers
Which of the following is not possible? A class that implements two interfaces. A class that inherits from two classes. A class
ozzi

Answer:

"A class that inherits from two classes"

Explanation:

If we're talking about Java, you can't extend from two classes. The reason for this is Java doesn't allow multiple inheritance.

The reason for this is to avoid the ambiguity caused by it. One of the cases where multiple inheritance can cause ambiguity is the diamond problem.

Diamond problem can occur if two classes (say B and C) inherit from one class (say A). And another class (say D) inherits from both B & C.

If B and C class override the same method from A class. And D class calls that method, which one will be called, class B's or C's??

4 0
3 years ago
A network administrator plugs a new pc into a switch port. the led for that port changes to solid green. what statement best des
gayaneshka [121]

The port is operational and ready to transmit packets.

<h3>What is transmission mode explain?</h3>

Transmission mode refers to the mechanism of transferring of data between two. devices connected over a network. It is also called Communication Mode. These. modes direct the direction of flow of information.

<h3>What is used to transfer data packets?</h3>

A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.

To learn more about Transmission mode, refer

brainly.com/question/18590710

#SPJ4

3 0
2 years ago
"Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of w
Galina-37 [17]

Answer:

Option C i.e., RIPEMD is the correct option for the following question.

Explanation:

Because RIPEMD is the algorithm that is used for the hash primary design characteristic which has two independent and unlike parallel chains of the calculation and computation and the outputs of which are then linked to the process at the end. It is also used for the safe process of replacing the 128-bit hash method.

Other options are wrong because these are not related to the following statement.

5 0
3 years ago
you are the it manager for your company. you have been asked to give the executive group the right to read, change, and assign p
inn [45]

The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

<h3>What do you mean of executive?</h3>

An executive is seen as a kind of a powerful person  and they are the people that are known to be  responsible for making things go on or  run smoothly in any organization.

Therefore, The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

Learn more about executive  from

brainly.com/question/838027

#SPJ1

5 0
2 years ago
Other questions:
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • Using computers in place of paper to design components, products, and processes is referred to as ______.
    11·1 answer
  • #include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid &gt; 0 ) { value += 20; } printf(val
    10·1 answer
  • When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
    8·1 answer
  • What soft ware can you use to erase all of your data from a hard drive safely
    13·1 answer
  • Your friend's job pays $5.00 per hour, and he works 20 hours per week. His tax rate is 20 percent. Assuming he works 50 weeks of
    11·2 answers
  • Describe the impact of improvement ls in technology and transportation on american citizens. ​
    7·1 answer
  • 70 point Brainlist to best answer
    15·1 answer
  • Difine the term pigment​
    14·3 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!