1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
11

Two different ways to bring up My Computer folder

Computers and Technology
1 answer:
seraphim [82]3 years ago
5 0
On a Windows PC, My Computer is a folder on the desktop. Alternatively, you can click on Start and access My Computer from that menu.
You might be interested in
Write a MATLAB program to accomplish the following: Create two vectors, a and b, where vector a contains all positive integers l
sattari [20]

Answer:

Explanation:

Below is the complete MATLAB code that performs the given operations.

a = 10:10:99 % Generating first vector

b = 2:2:18  % Generating 2nd vector

c = rdivide(a,b) % Dividing vector a by b and storing in c

d = times(c,c) -19 % Subtracting 19 from each element of vector c

c % Displaying value of c

d % Displaying value of d

Output screenshot

C =

 5 5 5 5 5 5 5 5 5

d =

6 6 6 6 6 6 6 6 6

3 0
3 years ago
where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
frez [133]
Not too sure what the answer the question would expect, or rather what terminology,

But I’d say key-value pairs

For example in CSS

key: value;

color: green;
3 0
2 years ago
Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object
NARA [144]

Answer:

Length of char array: sizeof(arr)

Length of a string object: myString.length()

Explanation:

The sizeof approach is generally not recommended, since this information is lost as soon as you pass the array to a function, because then it becomes a pointer to the first element.

4 0
3 years ago
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
4 years ago
What does a spam e-mail normally promise you?
nlexa [21]
The answer is a virus
7 0
3 years ago
Other questions:
  • Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
    8·1 answer
  • Which folder is the default choice for saving bitmap or JPEG files created by a user?
    9·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be
    14·1 answer
  • the part of the computer that contains the brain , or central processing unit , is also known the what ?
    12·1 answer
  • Given the availability of an ofstream object named output, write the other statements necessary to write the string "3.14159" in
    8·1 answer
  • Which screen should be open to customize or personalize a desktop background?
    15·2 answers
  • Write a C# program named DoubleDecimalTest thatdeclares and displays two variables - a double and a decimal.Experiment by assign
    9·1 answer
  • What will be displayed after this code segment is run?
    5·1 answer
  • Find the name of the professor with the maximum percentage of students that failed his course.
    5·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!