1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
4 years ago
11

What are all the folders located on the DOCK called?

Computers and Technology
1 answer:
Vadim26 [7]4 years ago
4 0

Answer:

Folders on the DOCK bar are called stacks

You might be interested in
Can someone help me out with this one? I'm not sure why my code is not working
UNO [17]

Answer:

Add this statement at the end of your steps() function

return ""

This statement will not print None at the end of steps.

Explanation:

Here is the complete function with return statement added at the end:

def steps(number):  # function steps that takes number (number of steps to print) as parameter and prints the steps specified by number

   i = 1  #assigns 1 to i

   while i < number + 1:  

       string = str(i) * 3  #multiplies value of i by 3 after converting i to string

       string1 = str(string)  # stores the step pattern to string1

       if i != 0:  # if the value of i is not equal to 0

           string1 = (i * 4*' ' + "\b" + "\b" + "\b" + "\b") + string  #set the spaces between steps

       elif i == 1:  # if value of i is equal to 1

           string1 = string  #set the string to string1

       print(string1)  # print string1

       i = i + 1  # increments i at each iteration

   return "" #this will not print None at the end of the steps and just add a an empty line instead of None.

Screenshot of the corrected program along with its output is attached.

5 0
4 years ago
HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn
loris [4]

Answer: D, C, E, are the answers! good luck.

Explanation:

5 0
3 years ago
Which of the following terms BEST describes the act of animating an object?
Whitepunk [10]
Bump mapping is right answer
7 0
3 years ago
Read 2 more answers
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Setting up a home network using wireless connections is creating a _____.
Olin [163]
The answer to setting up a home network using wireless connections is creating a (C) WAN
3 0
3 years ago
Other questions:
  • The program has a compilation error because s is not initialized, but it is referenced in the println statement. The program has
    8·1 answer
  • You easily can give slides in a presentation a professional and integrated appearance by using a placeholder.
    11·1 answer
  • Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top
    14·1 answer
  • The range A2:B4 has how many cells?   A. 2   B. 4   C. 6   D. 8
    11·2 answers
  • A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are i
    6·1 answer
  • The program asks the user to enter the time the call is made (day, evening, or night) and the duration of the call (a number tha
    5·1 answer
  • If you selected row 17 and then selected Insert Sheet Rows, row 17 _____.
    13·1 answer
  • ___________allows you to see what the final web page will look like.​
    10·1 answer
  • 9.
    8·1 answer
  • Identify the places in the code where there are object-oriented concept violations, content coupling, common coupling, control c
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!