1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
14

Where are all of your documents saved?

Computers and Technology
2 answers:
artcher [175]3 years ago
8 0

Answer:

Hard Drive (HDD)

Explanation:

ddd [48]3 years ago
3 0

Answer:

Hard Drive

Explanation:

The Hard Drive is where most if not all storage is compiled, the Computing Processing Unit is how the PC functions.

You might be interested in
Why is know app downloading in my android phone even if I have 900 MB ???
Mamont248 [21]

Answer:

May be you have not signed in with Google

8 0
3 years ago
Read 2 more answers
With a presentation open, you can hover your mouse pointer over a design theme on the Design tab, and PowerPoint will display th
algol [13]

Answer: Live preview

Explanation:

The live preview feature enables to display the current slide with the design theme formatting applied with the mouse pointer. This feature is also available in digital cameras where the screen can be used as viewfinder.

6 0
3 years ago
What is the median of 6, 16, 9, 20, 45, 30, and 32?<br> A. 9<br> B. 16<br> C. 20<br> D. 22
Oksana_A [137]
I believe the answer to your question is going to be C. 20
Hope this helps:)
8 0
3 years ago
Which types of attacks are thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and spe
lesantik [10]

The types of attacks that are known to be thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters are said to be Brute Force Attacks.

What is Brute Force Attacks?

This is known to be an attack that is said to be a very  crude type of attack and it is often seen as a brute-force attack.

Note that is one that does not depend on lists of passwords, but it is one that often tries all the  very possible combinations of permitted character types.

Hence, this type of attack was known to be historically seen as ineffective, and it is said to be The types of attacks that are known to be thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters are said to be Brute Force Attacks.

Learn more about Brute Force Attacks from

brainly.com/question/17277433

#SPJ1

3 0
2 years ago
What are you required to verify before allowing a person to operate your pwc?
stich3 [128]

<span>Before allowing a person to operate PWC, check that they meet the minimum age and boater education requirements for PWC. While near shore, show how to start and re board the PWC properly and make sure that he has at least 25 hours of PWC operation experience. Be sure explain how to steer and control the PWC properly.</span>

8 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • Write a program that accepts as input the mass, in grams, and density, in grams per cubic centimeters, and outputs the volume of
    14·1 answer
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    8·2 answers
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​
    11·2 answers
  • The average number of entities completed per unit time -- the output rate -- from a process is called ____.
    9·1 answer
  • Open excel program then use the (IF) function to fill the column of (Expensive/Cheap) then save your
    9·1 answer
  • Please help I’m not trying to fail
    7·2 answers
  • DEFINE Problem:
    11·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!