1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
12

Kumar was working on his term paper and had not saved his work before the battery died on his laptop. He panics because the pape

r is due in less than hour and he does not have time to retype it. He calls you, his classmate, in a panic. What would be the best advice to give Kumar?
Computers and Technology
1 answer:
Nina [5.8K]3 years ago
4 0

Answer:

By presuming Kumar was working on his term paper using Microsoft Word, he can be advised to restore the unsaved document using the Recover Unsaved Documents feature in Word.

Explanation:

Firstly, Kumar can click File tab in Word and click Manage Document. Kumar shall find the option Recover Unsaved Documents from a drop down list and he can click it as his option. At this stage, Kumar shall see the missing files in the dialog box. The recent loss file shall appear in the dialog box. Just open the desired document and save it.

You might be interested in
Write a method that returns a version of the given array where all the 10's have been removed. The remaining elements should shi
Harlamova29_29 [7]

Answer:

The removeTens method is as follows

public static int[] removeTen(int[] nums) {

int [] arr = nums;

   int index = 0;

   while(index < arr.length && arr[index] != 10){

       index++;

   for(int j = index + 1; j < arr.length; j++) {

       if(arr[j] != 10) {

           arr[index] = arr[j];

           arr[j] = 10;

           index++;        }    }

   for( ; index < arr.length; index++){

       arr[index] = 0;}}

   return arr;

}

Explanation:

This defines the removeTens method; it receives array nums as its parameter

public static int[] removeTen(int[] nums) {

This creates and initializes a new array

int [] arr = nums;

This initializes index to 0

   int index = 0;

The following is repeated when array element is not 10 and if array index is still valid

   while(index < arr.length && arr[index] != 10){

This increments the index by 1

       index++;

This iterates through the array

   for(int j = index + 1; j < arr.length; j++) {

This checks if array element is not 10

       if(arr[j] != 10) {

If yes:

           arr[index] = arr[j];

The current array element is set to 10

           arr[j] = 10;

The index is incremented by 1        

  index++;        }    }

This iterates through the array again and move 0s to the back

   for( ; index < arr.length; index++){

       arr[index] = 0;}}

This returns the new array

  return arr;

}

8 0
3 years ago
Which of the following might cause a shift from PPF1 to PPF2? I. A new source of high quality denim fabric. II. A new lighter me
topjm [15]

fAnswer:  A new source of high quality denim fabric

Explanation:

A shift from PPF1 to PPF2 would suggest a new improvement due to technology, innovation or raw material. Here a new source of high quality fabric would result in more and better production of fabrics.

3 0
3 years ago
Drivers should scan 10-12 secound down the road looking of potential hazards
Setler [38]
This statement is true.

Drivers should always scan the road ahead to check for any potential hazards so that they have enough time to safely avoid any dangerous situations. It is very important for a driver to be constantly scanning the road while driving to take in his or her surroundings.

Hope this answer helps! :)
8 0
3 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
4 years ago
NEED HELP ASAP! BRAINLIEST AND 20 PTS TO CORRECT ANSWER!
son4ous [18]

The correct answer is C.

8 0
3 years ago
Other questions:
  • Pros and cons of Processor Throttling or Scaling?
    13·1 answer
  • HELP NOW PLZZ/ Question: Complete the sentence with the correct response.
    11·1 answer
  • What role do career pathways play?
    11·2 answers
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • When a browser makes a request for a static web page, the web server a. finds the HTML for the page and renders it b. renders th
    11·1 answer
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • When parking on hills or an unlevel surface, make sure your_____is
    15·2 answers
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • What is the CPU's role?
    15·2 answers
  • Why would an end-user not generally buy a server? Explain your answer by referring to the typical role that servers perform. ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!