1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
10

Ivan has five workbooks open. He has arranged these files in a specific grouping so he can view them at the same time. In order

to save these files in this specific order, Ivan must create a .
Computers and Technology
1 answer:
Dafna1 [17]3 years ago
8 0
Folder, Right? I'm sorry if this is not correct.
You might be interested in
The information of an management information system comes from?
Debora [2.8K]

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

5 0
2 years ago
What file holds the preferences and settings of the currently signed-in user??
VashaNatasha [74]
The answer to the question above is ntuser.dat. This is actually a registry file that contains the registry information of the user or account. According to Windows, this is known to be as the <span>"central hierarchical database" as this contains relevant information of the user such as profiles, and both of its hardware and software.</span>
3 0
3 years ago
Jennifer has her own business. Recently, she has ventured into creation of a new line of apparel. She has created a new symbol t
Zolol [24]
I am think that is the anwer trademark
3 0
3 years ago
Read 2 more answers
Network access control authenticates users logging into the network and determines what data they can access and actions they ca
erik [133]

Answer:

The answer is letter A

Explanation:

The statement is TRUE

3 0
3 years ago
In a brief essay explain the security vulnerabilities of transition methods (6to4, etc.)
vlabodo [156]

Answer:

While transiting from IPv4  to IPv6, many offices and companies use both the protocols (Ipv4 and IPv6) at the same time. This scenario can increase the risk  rate of attack twice. All the flaws and vulnerabilities could be overlooked easily when transition is done.

On the other hand, while transiting Ipv6 to IPv4, the router does not tells or depicts that the communication is appropriate or if it could be used as a part of DoS attack that make it so much harder to trace the origin back.

The reason for the vulnerability of Transport Relay Translators (TRT) is that they do not apply Internet Protocol Security (IPSec) and thats why they are not secure.

i hope it will help you!

7 0
4 years ago
Other questions:
  • What are three distractions that can prevent a driver from focusing on driving? Explain how a driver can prevent these distracti
    15·1 answer
  • What are strategies that you can use to yield web sites that are relevant to your research topic?
    13·1 answer
  • Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
    12·1 answer
  • For your biology class, you have taken a number of measurements for A plant growth experiment. you wish to create a chart that s
    6·1 answer
  • What is the best strategy to avoid paying interest on your credit card
    8·1 answer
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • (ORAL COMMUNICATIONS)- I just need someone to please check if my answers are correct, and if not, please correct me :)
    8·1 answer
  • Point giveaway and brainliest
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!