1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
7

Right click on a spot of your desktop that is not covered by an icon, window, or menu. when the menu comes up, play with the opt

ions under the "sort by" menu. which setting do you like best and why?
Computers and Technology
1 answer:
Darya [45]3 years ago
3 0
Personally, I like to sort by the name. I prefer everything to be in order alphabetically. 
You might be interested in
Which of these can be considered data?<br> A:facts<br> B:information<br> C:belief<br> D:all of these
IceJOKER [234]

A) facts.

Facts is the only thing that can be considered REAL data.

6 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
Neko [114]

Answer

System restore

Explanation

System restore is a recovery feature that helps restore your system to the previous condition or point. Most computers have system restore disks which are an advantage to the users especially when the computer clashes.These disks are very effective when it comes to restoring the system to its initial state.

6 0
3 years ago
Read 2 more answers
You are the network administrator for a company and you want to separate the traffic from the accounting department from the res
vichka [17]

Answer:

internetwork

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the type of network that should be implemented is called an internetwork. This refers to interconnecting different types of networks to build a large, global network" such that any pair of connected hosts can exchange packets.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
Consider the acknowledgment for a packet with sequence number n. A __________ acknowledgment indicates that all packets up to an
antoniya [11.8K]

Answer:

cumulative

Explanation:

Acknowledgment acknowledges that receiver has correctly received a packets which implicitly informs the sender that the previous packets were already received correctly.

4 0
3 years ago
Other questions:
  • Which statement about word processing software is true? A)You can use it to perform mathematical calculations.B) You can use it
    6·2 answers
  • A _______ is used to analyze and summarize your data without graphical support. A. PivotChart B. PivotTable C. chart D. table
    8·1 answer
  • What nomenclature, commands, procedures are used by the program to define capabilities in the following
    15·1 answer
  • Describe three types of physical storage currently used. what usage scenarios would be ideal for each?
    7·1 answer
  • 1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the
    12·1 answer
  • Please, Help me with this question, I tried it but It always says #Value.
    5·1 answer
  • With what software tool can you see the applications that are currently runni
    13·1 answer
  • Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
    10·1 answer
  • You are querying a database of manufacturing company suppliers. The column name for supplier identification numbers is supplier_
    11·1 answer
  • what motivators should the action section of your sales message include? check all that apply. a satisfaction guarantee a proof
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!