1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
9

Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv

e is contained within a folder.
Computers and Technology
2 answers:
Valentin [98]3 years ago
7 0
A file is contained within a folder
lions [1.4K]3 years ago
6 0
A file is contained within a folder.
You might be interested in
In addition to telling you which programs are currently running, what other information does the task bar display
faust18 [17]

I've got task manager open right now; it shows you

  • Applications
  • Processes
  • Services
  • Performance
  • Networking
  • Users

(In that order)

6 0
3 years ago
MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games,
insens350 [35]

Answer:

Sports game

Explanation:

5 0
3 years ago
A man-in-the-middle attack or impersonation are likely to result in problems with
Ivan

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

6 0
3 years ago
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
Write steps: To open an old documents​
myrzilka [38]

Answer:

1.Click.

2.Choose “All Programs”

3.Then select, the “Microsoft Office” folder.

4.Now, open your desired Office application. 5.for e.g Microsoft Word 2010.

6.Once the application opens, select.

Click.

7.Now, select the document you wish to open in Office 2010 and click.

3 0
2 years ago
Other questions:
  • Your computer running Windows 7 is doing some very strange things with the operating system. You are fairly certain it is not a
    10·1 answer
  • First write a method to calculate the greatest common divisor (GCD) of two positive integers using Euclid’s algorithm (also know
    10·1 answer
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • A device that make it possible for a muitiple customer to share one address is called
    13·1 answer
  • What is a technological advancement that is now being used in tractors throughout America?
    6·2 answers
  • The goal of this project is to become familiar with basic Python data processing and file usage. By the end of this project, stu
    8·1 answer
  • Implement a simplified version of a crypto broker platform. Initially, there is an array of users, with each user depositing onl
    8·1 answer
  • _________ is the most popular high-level Java API in Hadoop Ecosystem. Cascading Scalding Cascalog None of the options
    7·1 answer
  • The best way to deal with crying children in the car is to ignore them or pull off the road
    15·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!