1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
8

Jeremy wants to run a program file from the command prompt. Which of the following should Jeremy type in the command prompt wind

ow to open the program?
program name
path name
file extension
run
drive name
Computers and Technology
2 answers:
atroni [7]3 years ago
8 0
Path name , so it could be like C:\Windows\system32\mspaint.exe

sammy [17]3 years ago
5 0

Answer:

Path name ( B )

Explanation:

To run a program file from the command prompt you have to specify the path name in which the program file is stored in so that the program will open.

Path name is used to give a name that describes where a file can be found when queried in a hierarchy of directories available.

program names are programs whereby merchandise includes names to the program it is usually like a title or saying on the program, this cannot be typed in the command prompt to run a program file because it doesn't take the search to where the program file is stored to open it up.  

You might be interested in
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
2 years ago
Identify the following as True or False.
Leni [432]

Answer:

The answer to this question as follows:

1) False

2) False

3) True

Explanation:

The description of the above option as follows

  • In option 1, A single character variable must be contained in one quote mark, but it is based on the alphabet, which is a specific device, and the price of a continued character varies from one device to another, that's why it is false.
  • In option 2, This option is wrong because in assembly language the identifier value must not exceed the length than 247 characters.
  • In option 3, It is correct because in the variable declaration the first char should be a letter, _, @ or $letter. A total of 1-247 characters. The default case is insensitive.

5 0
3 years ago
System software can be described as end-user software and is used to accomplish a variety of tasks.
irina [24]
Your answer is false :)

I hope this helps! :)
8 0
2 years ago
What is one of the main problems with shared web hosting? Select one: Sites that share resources are less susceptible to hacking
Pani-rosa [81]

Answer:

If one or more of the shared sites go down, then there is a good chance that your site will go down as well.

Explanation:

Shared web hosting is a form of web hosting service whereby more than one websites are placed on a single web server that connects to the internet.

Though it is cheaper, it has various problems. And over time, it has been concluded that the major problem associated with shared web hosting is the security issue.

This implies that "If one or more of the shared sites go down, then there is a good chance that your site will go down as well."

Some other problems associated with Shared web hosting are poor value, less flexibility, none advanced features, slow service, less support.

4 0
3 years ago
Which action will help you protect data in your computer in case of an earthquake?
Len [333]

Answer:

Explanation: 13

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which markup language would be considered the most current for web design? HTLM, HTML5, XHTLM, XHTML 6
    14·2 answers
  • Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above,
    5·1 answer
  • The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises
    6·1 answer
  • HELP ASAP
    10·2 answers
  • Do the shape of a sign gives you a clue about the information contained on the sign
    7·1 answer
  • Que son los sistemas de control con retroalimentacion
    10·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    10·1 answer
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • Compare and contrats the vain digestive system from the human digestive system.​
    10·1 answer
  • What are the four steps for planning a table?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!