1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
8

You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on

hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens
Computers and Technology
1 answer:
Hoochie [10]3 years ago
7 0

Answer is given below

Explanation:

  • when performing in computer and we have two files on the computer first one is string and another one is the music list                
  • so when we enter the command paste strings music than there will they display side by side on the screen.
  • and on the left side of lists the string in screen and the right side is columns list the music book              
You might be interested in
Power delivered to the hitch of tractors is called
maks197457 [2]
The answer you are looking for is drawbar horsepower. Good luck!
4 0
3 years ago
QUESTION 5
Zepler [3.9K]

Answer:

allows users to accomplish tasks such as create text documents.

Explanation:

8 0
2 years ago
To use an imported image, simply drag it from the desktop onto the stage. true or false?
elena-s [515]

Answer:

True

Explanation:

Because i have done it before and it works on an accer

6 0
4 years ago
What is the ls option to list entries by lines instead of by columns?​
gogolik [260]

Sometimes I just meet some Unintelligen ppl

7 0
3 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
4 years ago
Other questions:
  • Slicing can best be described as
    9·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • What is the quickest way to change the format of a table?
    8·1 answer
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
    5·1 answer
  • ___MSDS provides information on how to handle, store, discard and care for potentially hazardous chemicals. true or false?​
    5·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • Label provides the code that executes if no case label is matched ​
    6·1 answer
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!