1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
12

Write a file path for a document file that is saved on the F drive then a folder called homework, then a folder called math. The

name of the file is fraction_hw and remember it is a document
Computers and Technology
1 answer:
ad-work [718]3 years ago
7 0
F:\homework\math\<span>fraction_hw.docx</span>
You might be interested in
Learning design software, applying to college and creating a website to showcase work are examples of _____________ that lead to
mariarad [96]

Answer:

Web designer

Explanation:

A Web designer is someone who knows about some programming languages like HTML, CSS or JavaScript, but in website development, there are two main areas, in this case, Front-End and Back-End.

A web designer uses Front-End because it only elaborates on the system's view and all about the view for the users.

7 0
4 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
vitfil [10]

Answer:

64 bits.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the word size used by it is 64 bits.

3 0
3 years ago
What is the least number of options you should come up with to help you solve a problem?
Lubov Fominskaja [6]

Answer:

Comparing
Whole
Numbers

Symbols
are
used
to
show
how
the
size
of
one
number
compares
to
another.


These
symbols
are
<
(less
than),
>
(greater
than),
and
=
(equals).

For
example,
since
2
is
smaller
than
4
and
4
is
larger
than
2,
we
can
write:
2
<
4,
which


says
the
same
as
4
>
2
and
of
course,
4
=
4.


• To
compare
two
whole
numbers,
first
put
them
in
numeral
form.


• The
number
with
more
digits
is
greater
than
the
other.


• If
they
have
the
same
number
of
digits,
compare
the
digits
in
the
highest
place
value


position
(the
leftmost
digit
of
each
number).
The
one
having
the
larger
digit
is

greater
than
the
other.


• If
those
digits
are
the
same,
compare
the
next
pair
of
digits
(look
at
the
numbers
to


the
right).


• Repeat
this
until
the
pair
of
digits
is
different.
The
number
with
the
larger
digit
is


greater
than
the
other.


Example:
402
has
more
digits
than
42,
so
402
>
42.


Example:
402
and
412
have
the
same
number
of
digits.


We
compare
the
leftmost
digit
of
each
number:
4
in
each
case.


Moving
to
the
right,
we
compare
the
next
two
numbers:
0
and
1.


Since
zero
is
less
than
one,
402
is
less
than
412
or
402<412.

Explanation:

8 0
3 years ago
You need to apply security settings to the registry on a Windows server. Which command should you use
Mekhanik [1.2K]

There are different kinds of measures taken in security. The command should you use is   Certutil.

<h3>What is Certutil</h3>

Lawrence Abrams was known to be the man that mad Windows to have a built-in program called CertUtil.

This is often used to manage certificates in Windows where one can install, backup, delete, manage, and perform a lot of functions related to certificates and certificate that are saved in Windows.

See full question below

You need to apply security settings to the registry on a Windows server. Which command should you use?

certutil

regedit

regex

cipher

Learn more about Certutil from

brainly.com/question/24931496

7 0
2 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
Other questions:
  • What OS is most commonly used by businesses? Linux Macintosh Microsoft Windows
    11·1 answer
  • Namespaces cannot have namespaces as members.<br><br> True<br><br> False
    7·1 answer
  • How to divert all calls &amp; sms from other phone to my phone? is it possible?
    14·1 answer
  • A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a, from a d
    11·1 answer
  • The function below takes two integer parameters: low and high. Complete the function so that it prints the numbers from low to h
    14·1 answer
  • Sharon is thinking about opening a bakery. She knows she wants to set her own hours, reduce her stress and make a profit. But sh
    14·1 answer
  • What does a student use when types text into a word processing program ?
    7·1 answer
  • How can you ensure that the website you are using is secured?
    8·1 answer
  • Why should the Six-Step Process be considered as an iterative process?
    8·1 answer
  • ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!