1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
3 years ago
5

When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and

windows 8.1?
Computers and Technology
1 answer:
juin [17]3 years ago
3 0
THIS PC. 

HOPE THIS HELPS
You might be interested in
What type of windows network model allows all the participants to be represented equally on the network with no single computer
noname [10]
The workgroup as a type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another. The workgroup is peer-to-peer local area network. 
Members of this network group can share files, printers, Internet connection.<span> and other local network resources.</span>
4 0
3 years ago
Suppose you want to use an Internet cafe to login to your personal account on a bank web site, but you suspect that the computer
kupik [55]

Answer:

Copy and paste the needed information from text editor to clipboard then to the web browser.

Explanation:

The keylogging software is an application that can connect to the keyboard API through software APIs or could be kernel based or hypervisor based, JavaScript based etc, to capture keyboard events.

It records these events which makes this tool useful for attackers in networks. So long as the clipboard logging or screen logging does not accompany the keyboard loggers, data can be copied on clipboard and pasted to the target point.

8 0
3 years ago
When evaluating the validity of a website beyond its URL, you can practice the "rule of 3" which means
Schach [20]

Any information on a website should be findable within 3 mouse clicks.

5 0
3 years ago
Read 2 more answers
What steps can be used to password-protect a worksheet?
muminat

Answer:

Review

Changes

Protect sheet

Explanation:

I did it

8 0
3 years ago
How do you know if someone read your message on messenger?
kherson [118]
It would say that the person read the message on the picture of the person. Example if you texted your friend at 7.00 and it said that the person read at 7.15. got it now?
3 0
3 years ago
Other questions:
  • An array name and index are separated using ____.
    13·1 answer
  • What is a GUI?
    11·1 answer
  • An index purports to speed data retrieval. you, therefore, index every attribute in each table. select the likely consequence.
    15·1 answer
  • What is Naptha used for?
    9·2 answers
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • It's a holiday poop in my bitt
    10·2 answers
  • You have a passage of text that needs to be typed out, but some of the letter keys on your keyboard are broken! You're given an
    14·1 answer
  • Jjhb ft fv tuning Denise l Debbie
    9·1 answer
  • In addition to reduced power consumption, what is an advantage of using hyperscale cloud computing data centers?
    8·1 answer
  • Identify and explain groups that may be impacted by nanotechnology.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!