1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
10

The command button to protect a document is part of the​.

Computers and Technology
1 answer:
Arlecino [84]3 years ago
7 0

Answer:

C file tab

Explanation:

hope this helps

You might be interested in
Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every poss
dsp73
A brute force attack. Ciphers should be sufficiently complex for this to be ever successful.
6 0
3 years ago
Microsoft Word Module 3 the answers for online class University MIS
Artist 52 [7]

Answer:

Nope

Explanation:

You can use open office for free

7 0
3 years ago
You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuratio
kolezko [41]

Answer:

ipconfig / release command will be used to request new IP configuration information from a DHCP server

Explanation:

The ipconfig /release sends a DHCP release notification to the client so that the client immediately releases the lease henceforth updating the server's status information . This command also mark the old client's id as being available. Thus, the command ipconfig /renew then request a new IP address.

4 0
3 years ago
Write a method called equals that takes in two string arrays and returns true if they are equal; that is, if both arrays have th
Sonja [21]

Answer:

public boolean equals( String [ ] a, String [ ] b ){

       if (a.length == b.length){

           for (int i = 0; i < a.length; i++){

               if ( ! a [ i ].equals( b [ i ] )) {

                   return false;

               }

           }

           return true;

       }

       return false;

   }

Explanation:

The above code has been written in Java.

// 1. Method header declaration

// Method name is <em>equals.</em>

<em>// </em>It takes in two arguments which are the two string arrays <em>a</em> and <em>b.</em>

// Since the method returns a true or false, the return type is boolean

public boolean equals( String [ ] a, String [ ] b ){

       

       // 2. Check if the two arrays are of same length

       if (a.length == b.length){       // Begin outer if statement

           

           // If they are equal in length,

           // write a for loop that cycles through the array.

           // The loop should go from zero(0) to one less than

           // the length of the array - any of the array.

           for (int i = 0; i < a.length; i++){

               // At each of the cycle, check if the string values at the index which

              // is i, of the two arrays are not equal.

               if ( ! a [ i ].equals( b [ i ] )) {

                 

                   // If they are not equal, exit the loop by returning false.

                   return false;

              }

          }

          // If for any reason, the for loop finishes execution and does not

          // return false, then the two arrays contain the same string values at

          // each index. Therefore return true.

           return true;

       }                // End of outer if statement

       // If none of the return statements above are executed, return false.

       return false;

   }      // End of method.

<em>Hope this helps!</em>

8 0
3 years ago
What material replaced stone as the primary materials used to make tools and machines by humans
swat32

steel is pretty common, if not metal

4 0
3 years ago
Other questions:
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • _____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
    7·1 answer
  • Read the excerpt from a teacher's lesson plan. Global communication, especially in today's digital age, can benefit all of you i
    6·2 answers
  • The chief reason that family and friends are frequent targets of aggression is that
    6·1 answer
  • _______is a term which describes how the operating system will interrupt the execution of an application when an application of
    14·1 answer
  • What is not true of efs
    11·1 answer
  • 50 POINTS!!!
    14·1 answer
  • What operating system good for 3d modeler
    15·2 answers
  • LAB: Phone number breakdown Given a long long integer representing a 10-digit phone number, output the area code, prefix, and li
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!