1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olenka [21]
3 years ago
5

What keyboard combination can you use to open the windows tool context menu, which contains options such as power options and di

sk management?
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
8 0
Windows button and x
You might be interested in
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
The school tie is made from a piece of fabric measuring 135cm long by 9cm wide. The fabric is supplied in a roll that is 90mm wi
yawa3891 [41]

Answer:

The cost to make one tie is approximately £4.79

Explanation:

The details of the dimensions of the fabric needed to make the school tie are;

The length of the required fabric = 135 cm

The width of the fabric for the tie = 9 cm

The width of a roll of fabric when sold = 90 mm = 9 cm

The cost of the fabric per meter = £3.55

The width of the roll of fabric = The width of the  fabric material required to make a tie

1 meter  = 100 cm

The cost of 1 m (100 cm) of fabric = £3.55

Therefore;

The cost of the 135 cm of the fabric required for the tie, <em>c</em>, is found as follows;

c = £3.55 × 135/100 = £4.7925

The cost of the fabric required to make one tie giving the answer to two decimal place, c ≈ £4.79

5 0
3 years ago
What term is used to record successful and unsuccessful access attempts
MArishka [77]
I think it is called an audit trail. 
6 0
4 years ago
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft, the browser doe
Lunna [17]

Answer:

DNS

Explanation:

The DNS, also known as the Domain Name System is regarded as the internet's phonebook. It is through this medium that information is access online using domain names such as www.microsoft.com. While web browsers can communicate via IP addresses, the Domain Name System (DNS) translate the www.microsoft.com to the IP addresses in order to help the browsers load the resources on the internet. In a case where an error message is received, then the DNS network setting will show you the address of the server to resolve the issue.

5 0
4 years ago
During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. Wh
allochka39001 [22]

Answer:

Rick has identified a cost risk.

Explanation:

Risk is the probability of loss in a given setting. Herein, the risk involved is the inadequate assessment of the costs involved to carry out the project usually as a result of poor pricing evaluation of resources required for the project. At the early stage of every project, effective and efficient cost estimation is needed because it provides a basis for estimation of the total costs, it helps distribute the cost budget, it eases decision making and thereby assuring a level of profitability, everything being equal.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Manny has created more than one hundred bookmarks. When he looks at the menu, he has to scroll through a very long list of bookm
    15·1 answer
  • 5255555555555+55555555555555/1111*99442
    14·2 answers
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Select the term used to describe the process, within the context of Active Directory, that allows a person with higher security
    5·1 answer
  • What is wrong with the following declaration? How should it be fixed?
    11·1 answer
  • 1. We want to add a button to the tally counter in Section 9.2 that allows an operator to undo an accidental button click. Provi
    8·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • Why does my wifi keep disconnecting and reconnecting?
    9·1 answer
  • What is one of four key principles of Responsible Artificial Intelligence
    5·1 answer
  • Fill in the blanks to help write this professional e-mail:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!