1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
4 years ago
12

Can you please answer the questions computer subject

Computers and Technology
1 answer:
murzikaleks [220]4 years ago
4 0

communicating

Explanation:

to connect the society members together

You might be interested in
Find H.C.F of 4,5,10 by all the three methods.​
Deffense [45]

Answer:

1. Factorization Method

2. Prime Factorization Method

3. Division Method

7 0
3 years ago
You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
Gelneren [198K]

Complete Question:

You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of?

Group of answer choices

A. Wildcard

B. The Tab key

C. Regular expressions

D. The Escape key

Answer:

B. The Tab key

Explanation:

In this scenario, You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of the Tab key.

When working with the command line prompt (cmd) on a Windows, Unix or Linux computer, typing file paths is sometimes difficult or considered to be a burden because they are lengthy (too long) and perhaps confusing to the user. To help yourself out, you can always use the "Tab key" to autocomplete names of directories or file paths in an alphabetical order, while in the command line.

<em>Additionally, pressing the "Tab key" continuously while in the command line would cycle or toggle all available commands in an alphabetical order. </em>

3 0
3 years ago
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
Every file on a storage device has a _______. (a.) name (b.) size (c.)both of the above (d.) none of the above
zmey [24]
The correct answer is: C: both of the above, i. e. name and size.
8 0
3 years ago
Jason logged into a banking website. A few later, he found that money from his account had been transferred to another account w
NemiM [27]
I think it’s bank fraud or cybercrime idk
8 0
3 years ago
Other questions:
  • Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what ha
    10·1 answer
  • What was the treaty of the Meter
    13·1 answer
  • What skills and characteristics do you think would be necessary for a lighting board operator to be successful?
    8·2 answers
  • Pick the JavaScript code for the following pseudocode. If age &gt;= 65 Then discountRate = 0.10 End If Group of answer choices
    12·1 answer
  • Select the correct answer from each drop-down menu. What skills should Tara hone to get a job in testing? Tara is a recent compu
    12·1 answer
  • Nappropriate use of technology makes it easier for cyber bullies to <br> others.
    5·2 answers
  • Select the correct answer.
    15·1 answer
  • Consider the following code segment:
    14·1 answer
  • Describe s computer network that you are familiar with ?
    8·1 answer
  • What are the two different types of dns requests?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!