1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
3 years ago
15

What folder is used to store offline files and folders managed by the offline files utility?

Computers and Technology
1 answer:
galina1969 [7]3 years ago
4 0
<span>Offline files are stored in [systemdrive]:\windows\csc folder by default</span>
You might be interested in
A Personal Fitness Tracker is a wearable device that tracks your physical activity, calories burned, heart rate, sleeping patter
____ [38]
The answer is a, this is true
7 0
3 years ago
Brainliest to Best Answer!
Shtirlitz [24]
ArrayIndexOutOfBoundsException
because it includes the extra info that you tried (and failed) to access an array
8 0
3 years ago
your manager has asked you to implement a network infrastructure that will accommodate failed connections. which of the followin
Softa [21]

The <u>Mesh</u> network topologies provides redundancy for a failed link.

What are network topologies?

A communication network's topology refers to <u>how its components are organized.</u> Command and control radio networks, industrial fieldbuses, and computer networks are just a <u>few examples of the several types of telecommunication </u><u>networks </u><u>that can be defined or described using </u><u>network topology</u><u>.</u>

There are eight fundamental topologies that can be identified by studying network topology: <u>point-to-point, bus, star, ring or circular, mesh, tree, hybrid, or daisy chain.</u>

Examples of physical network topologies include star, mesh, tree, ring, point-to-point, circular, hybrid, and bus topologies. <u>Each of these </u><u>networks </u><u>consists of a unique arrangement of nodes and links.</u>

To learn more about network topologies, use the link given
brainly.com/question/13818848
#SPJ4

4 0
1 year ago
Give four example of computer virus​
asambeis [7]

trojan virus allows some one to sneak a bunch of coruppted data or more viruses into a system. a worm is able to access some ones computer and steal information a firebug is used to crash someones computer and spyder is used to scramble some ones work and deleting it

6 0
3 years ago
Which statement describes the word "iterative"?
Umnica [9.8K]

guess you better read the directions and just read the book yourself and find the answer.

0 0
3 years ago
Read 2 more answers
Other questions:
  • What will be displayed after the following statements have been executed? int x = 15, y = 26, z = 32; x = x + 12; y = y/6; z -=
    15·1 answer
  • Which type of operation writes the file system structure to the disk?
    5·1 answer
  • 38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
    15·1 answer
  • Given that a method receives three parameters a, b, c, of type double, write some code, to be included as part of the method, th
    8·1 answer
  • Write a function called matches that takes two int arrays and their respective sizes, and returns the number of consecutive valu
    6·1 answer
  • Data from RAM may be placed where to free up space?
    7·1 answer
  • What is the name given to the amount that a particular camera’s lens opens?
    12·1 answer
  • Which of the following is NOT a font style? Color Bold Italic Regular
    10·2 answers
  • What is the general term for programs used to operate a computer
    15·1 answer
  • Describe s computer network that you are familiar with ?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!