1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
4 years ago
14

What is the correct method for moving a control file (assume you use PFILE)?

Computers and Technology
1 answer:
Mumz [18]4 years ago
4 0

Answer:

b

Explanation:

You might be interested in
What is the main difference between EDBAC and EDNIAC......​
lawyer [7]

Answer:

EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.

Explanation:

6 0
4 years ago
Read 2 more answers
Send this as a Python file. Note: this is an example where you have the original file, and are writing to a temp file with the n
Nonamiya [84]

Answer:

you have to include insted the file the instructions...

Explanation:

that is what you need to do (if that is what you are asking)

6 0
4 years ago
Read 2 more answers
What sequence would a user need to follow to change Chart A into Chart B?
alexandr402 [8]

Either options C or D

You can change the chart type of the whole chart or for single data series in most 2-D charts to give the chart a different look. In 3D or bubble charts, you can only change the chart type of the whole chart. By following the steps in the answers above, you will be in a position to select available chart type like column chart or line chart.

3 0
3 years ago
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you n
Bezzdna [24]

The type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

<h3>What is F-connector?</h3>

The F-connector is a type of RF connector which is used to connect the Video equipments to the antennas and setup box.

A technician is installing RG6 cable.

  • The RG6 cable is a coax cable.
  • This cable is used in satellite signal transmission, generally for TV and setup box.

Now the technician is ask to retrieve a connector from the parts drawer. Here, we use F type connector for this RG6 cable.

Thus, the type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

Learn more about the connector cable here

brainly.com/question/9082842

#SPJ1

4 0
2 years ago
Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing histo
Zanzabum

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

  • Web cookies
  • Caches
  • Browsing history

Read more: brainly.com/question/3840341

6 0
2 years ago
Other questions:
  • Complete the function ConvertToFeetAndInches to convert totalInches to feet and inches. Return feet and inches using the HeightF
    5·1 answer
  • MATLAB graphics user interface:<br> Describe what Folder, Command Window and Workspace are.
    5·1 answer
  • What is alphabet symmetry
    12·2 answers
  • The ______________________ are incident management personnel that the incident commander or unified command assign to directly s
    10·1 answer
  • A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ___
    14·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa
    6·1 answer
  • federal law requires public libraries to install filtering software on computers to prevent children from accessing adult conten
    14·1 answer
  • When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
    6·1 answer
  • Hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
    14·2 answers
  • Select the correct word to complete the sentence.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!