1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
13

For window 7 explain the steps you will use to find the available program you will list.

Computers and Technology
1 answer:
Alex_Xolod [135]3 years ago
8 0
Follow these steps.
1. Make sure that your pc is on.
2. Press your Window key - on your bottom left of your keyboard you will see a window key. 
3. After pressing it will show a tab on your bottom left of your monitor.
4. On that tab you will see an (All Programs) text.
5. Click it and it will show all programs available on your pc.
You might be interested in
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
yarga [219]

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

7 0
4 years ago
Which statement reflects inherent bias in reading and learning about our world?
love history [14]
I had to look for the options and here is my answer:

The statement that best illustrates what inherent bias is at is is used in reading and learning about the world is this: "<span>Historians are interpreting the past." Definitely, historians do not interpret the past, but rather their field focuses on gaining facts and information related the past.</span>
8 0
3 years ago
A wireless (radio) transmission of data can only travel a short distance.<br><br> True or false?
timofeeve [1]

I believe this is false as some radio waves can travel beyond our solar system

7 0
3 years ago
When writing test methods, what functionality is verified by the system method "runAs()"?
olchik [2.2K]

Answer:

The main functionality verified by this test method command is user sharing record.

Explanation:

Generally, every apex code runs in system mode.

Apex is strong object-oriented programming language that allows the developers to execute flow and transaction control.

Using syntax which look like java and acts as databases, Apex allows the developer to add any type of business logics to an event which can include button, clicks records or visual pages.

Apex code can be initiated by web service request.  

The permissions and record sharing of current user are not consider by apex codes.

Now the system method runAs() will allow you to take or write a test method which will basically change the user context to an existing or an new user, so that the record sharing will take place.

runAs() command will not change or anything done with user permissions or permission levels, it will only record sharing of the user.  

When you use runAs() command the original and true context will run after the test method is once completed under the command of runAs().

The runAs() has no concern with the user license.  

If there is no or expired your personal or organization license you can just make a new user with this runAS() command.

In using this command we have to make a private class by the name of this test and then our further code to make a user , afterwards  which we will the true and original code of ours which we want to run.

There are many other uses of runAs() like  

 Mixed DML operations in test by opening the DML operations.

 We can also use it as a version which will take a package as a version argument. This will cause the code a specific version.

runAs(System.Version) is the command used for this.

4 0
3 years ago
Use the table on the right to convert from binary to decimal.
postnew [5]

Answer:

There is no table, so I can only comment on the statements:

The binary value of decimal 10 is A.  ==> False, however A is a hexadecimal representation of 10.

The binary value of decimal 13 is 1001  ==> False, 13 would be 1101.

The binary value of decimal 15 is 1111.  ==> True.

The binary value of decimal 14 is E. ==> Again E is a hexadecimal representation of 14.

7 0
3 years ago
Read 2 more answers
Other questions:
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I question 3<br> need correct the answers to all
    12·1 answer
  • Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
    9·1 answer
  • A _________ is automatically launched by some trigger and appears in front of the active window
    12·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Question 1
    10·1 answer
  • Explain one way in which programmers may get hired.
    9·1 answer
  • Select the correct answer.
    10·1 answer
  • What can be the maximum possible length of an identifier 3163 79 can be of any length​
    5·1 answer
  • What ethical concerns might arise from applying new IT to law enforcement?
    5·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!