1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
6

A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, w

hen she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
Computers and Technology
1 answer:
enot [183]3 years ago
8 0

Answer: The user had a mandatory profile.

Explanation:

A user profile is considered mandatory and such profile is known as pre-configured roaming user profile that only administrators can use to make precise settings for clients. In this type of profile, one can adjust his or her desktop settings, the adjustment are temporarily stored after logging off from the profile.

You might be interested in
In your own words, what does Hypertext Markup Language [HTML] do?
nexus9112 [7]

Answer:

HTML dictates how the browser presents images and text on a webpage.

Explanation:

3 0
3 years ago
Read 2 more answers
And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
WITCHER [35]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

"Why the computer is called diligent

Versatile machine"

Computer is called versatile machine because it is used in almost all the fields for various purposes.Because it can perform the task repeatedly without loosing its speed and accuracy for a long time.They are versatile because they can be used for all sorts of task.They can also do many of the same tasks in different ways.Computer is the electronic device which perform the logical and mathematical calculation.Computer is known as the  versatile machine because it is very fast in every field and its part of life without it was cannot imagine life.

It can do the work faster and in every field the computer is used for making their work faster.

It can perform the work fast so it is called versatile machine.

Advantages of versatile machine:

  • Computer are very fast due to which thousand of job can be performed within the short period of time.
  • Complex mathematical problems and logical operations can be solved by using this computer.
  • As computer is versatile device,multiple task like communication,graphics,documentation can be done.

Disadvantages of versatile machine:

  • Computers are machine hence they have no brain so they work according to the program instruction set inside it.
  • It is an electronic deice and it uses electronic sources to work,So it is very risk to store data and information on the computer independently because some electric and electronic damages may damage the data.So we have to make regular backup of the data.

5 0
2 years ago
Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
kompoz [17]

Answer:

Following are the program in the C++ programming Language.

//header files

#include <iostream>

#include <vector>

using namespace std;//name space

// define main method

int main()

{

//set integer variables

int size, num;

//get input the size of the list

cout<<"Enter size of list: ";

cin >> size;

//set integer type vector variable

vector<int> vecs;

//Set the for loop

for (int index = 0; index < size; ++index)

{//get elements of the list from the user

cout<<" :";

cin >> num;

//push back the elements of the list

vecs.push_back(num);

}

//storing the first two elements in variable

int n = vecs[0], n1 = vecs[1], current , temp;

//set if conditional statement

if (n > n1)

{

//perform swapping

temp = n;

n = n1;

n1 = temp;

}

//Set for loop

for (int index = 2; index < size; ++index)

{

//store the value of the vector in the variable

current = vecs[index];

//set if conditional statement

if (current < n)

{

//interchange the elements of the variable

n1 = n;

n = current;

}

else if(current < n1)

{

n1 = current;

}

}

//print the value of first two smallest number.

cout <<"\n" <<n << " " << n1 << endl;

return 0;

}

<u>Output:</u>

Enter size of list: 5

:10

:5

:3

:21

:2

2 3

Explanation:

Here, we define the required header files and namespace then, we define "main()" function inside the main function.

  • Set two integer data type variable "size", "num".
  • Print message and get input from the user in variable  "size".
  • Then, we set integer vector type variable "vecs".
  • Set the for loop to get the number of input in the variable "num" from user.
  • Then, we push back the elements of the list and store first two elements of the list in the variable "n", "n1".
  • Set the conditional statement to perform swapping.
  • Define the for loop to store the list of the vector in the integer type variable "current".
  • Finally, we print the value of the two smallest numbers of the list.
8 0
2 years ago
To clear a filter, click the ____ button on the home tab and then click clear all filters.
Shtirlitz [24]
Advanced button

Filter is important to see the data you want displayed only. In order to clear all filters in Access, click the Home tab, select Sort and Filter group option, click ADVANCED and then proceed to Click ALL Filters
5 0
2 years ago
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
2 years ago
Other questions:
  • 20 points/ When creating a storyboard, in which section do you mention how you move from one shot to the next?
    11·1 answer
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • Which of the following is true regarding packaged software and custom software? Group of answer choices Packaged software are ap
    13·1 answer
  • Where must virtualization be enabled for VM (virtual machine) software to work?
    14·1 answer
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • Write a program that accepts two integers from the user and perform one of the four arithmetic operations based on user’s choice
    11·1 answer
  • How is modern technology developed? Explain.
    14·2 answers
  • Brainliest
    13·2 answers
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
  • 3. What report shows what mobile devices were used to view a website?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!