1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
5

Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f

iles as they are B. Delete the files C. Rename the files D. Move the files
Computers and Technology
1 answer:
stira [4]3 years ago
5 0
I believe it is B hope this helped you<span />
You might be interested in
What is a Boolean operator?
ASHA 777 [7]

Answer:

The correct answer is search parameters set to identify specific information during Internet searches.

Explanation:

A Boolean operator is used to connect words or symbols that allows setting search parameters to include or exclude items in a text search.  

The booleans operators are:

  • AND.
  • OR.
  • NOT.
8 0
4 years ago
Which of the following applies to a DNS caching server? (Choose all that apply.)
Alborosie

Answer:

The answers are:  it is used to enable fast DNS queries and  It can help reduce the amount of network traffic generated by DNS servers.

Explanation:

Because a DNS server can resolve a query from tis local data sends a recursive qyery to a root server.

3 0
4 years ago
Supplies/material used in iron​
Novay_Z [31]
The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.
3 0
3 years ago
Under the common criteria, which term describes the user-generated specifications for security requirements?
Irina-Kira [14]

The correct answer to this question is the:

“Protection Profile (PP)”

<span>According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.</span>

6 0
4 years ago
To create nested lists within each of these topical areas that would contain links to specific pages on the AllStyles website. I
Gwar [14]

Answer:

The answer is add a new list within a list.

Explanation:

Because a nested list is a list within a list. It is the same effect of a bulleted outline in a word processing document you probably used a variety of indentations and bullet point types to denote items that were subpoints of another item in the outline.

7 0
3 years ago
Other questions:
  • Spreadshet formula to add totals​
    12·1 answer
  • How do you pass graphic design. I have to make a project with a picture in the letter.
    6·1 answer
  • Assume that PrecinctReport is a structured type with these fields, address (a string), and three int fields which are counts of
    9·1 answer
  • In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
    11·1 answer
  • What devices gives input​
    5·1 answer
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
    14·2 answers
  • Internet is an interconnected networks <br> o true <br> o false
    5·1 answer
  • Term of The surroundings and conditions of your workplace
    6·1 answer
  • What's the use of computer?Where are they used?​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!