1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
9

What is the most common drive letter where window stores most data and programs. 1,a 2,b 3,c 4,e

Computers and Technology
1 answer:
madam [21]3 years ago
5 0
3, C drive. The C drive the drive as where windows is stored...it is also the default drive for programs unless changed.
You might be interested in
The Blue Screen of death is not an common error, and it is highly likely that you have encountered and fixed several already. Di
Anna007 [38]

Answer:

your anwser is B

Explanation:

7 0
3 years ago
Which View option allows you to view your document as it would appear when posted online?
kondaur [170]

I assume this is in regards to Microsoft Word?


If so, then the Web Layout view will allow you to view the document as it would look on a webpage.

3 0
4 years ago
What feature is available to add a suggestion in the margin of someone else's document? Annotation Bookmark Comment Highlight
Step2247 [10]
Comment i think is the answer
4 0
4 years ago
Read 2 more answers
The new ICH E6(R2) integrated addendum requires sponsors to implement systems to manage quality throughout all stages of the tri
WINSTONCH [101]

Answer: Identification of study risks to determine which may safely be omitted from continual monitoring

Explanation:

 The ICH E6 basically uses the system that uses the risk based approach that include the identification of the risks of study that basically determine the continual monitoring safely.

The ICH met a specialist working gathering to make an addendum to the current E6 rule. The master  working gathering was comprised of ICH individuals from both industry and administrative offices, just as  observers to address and flow examine themes like quality by plan, quality hazard the board

7 0
4 years ago
Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
pentagon [3]

Answer:(d)Scan shows that no scanned port is live on the network

Explanation:

Honeypot shows any attempt of unauthorized access to information in the system. Scan showing not scanned port is live on the network shows the presence of honeypot so that hackers could be trapped to be believed that there are no scanned port.

4 0
3 years ago
Other questions:
  • How many service packs did windows 7 have?
    9·1 answer
  • What is the output of the following snippet if the user enters a value of 11 for the variable x and 4 for the variable y? x=int(
    5·1 answer
  • What is "social
    13·2 answers
  • Select the correct answer. Tom recently visited a science exhibition where he learned that computer experts programmed robots to
    6·2 answers
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • Study the sentence below
    13·2 answers
  • Please help me on this please i am giving all of my points so please help me
    6·1 answer
  • Which of the following statements is true about DVI connectors? *
    10·1 answer
  • Sydnee would like a chart to appear once in her report, but she is having wouble making this occur She does not understand why t
    13·1 answer
  • During an IFR flight in IMC, you enter a holding pattern (at a fix that is not the same as the approach fix) with an EFC time of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!