1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
4 years ago
13

Saving a file as a new filename can be accomplished through the Save As dialog box.

Computers and Technology
1 answer:
Arisa [49]4 years ago
4 0

Answer:

True.

Explanation:

A dialog box is a small window that serves as a controlling element in computers. The name dialog box is suggestive that it is a window that helps the user to communicate and response with an answer.

There are several types of common dialog box such as open dialog box, save as dialog box, print dialog box, etc.

Save as dialog box is a window that enables the user to save a file with a new name and new location. Save as dialog box can be opened by going to the File menu and click Save as. After the Save as dialog box appears, the user is able to change file name, location, etc.

Thus the statement is true.

You might be interested in
Create a class template for a class named GeneralStackthat holds
Elan Coil [88]

Answer:

data member as an array named stack of size 50 to store certain elements Three member functions i.e. push(type) to add elements in the Stack, pop() to ...

3 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
If an external server needs to communicate with servers inside the green zone, which network setting on smoothwall can be opened
astraxan [27]

The network setting on the smooth wall that can be opened when the external server has the need to communicate with the servers inside the green zone is the DMS±pinholes as the pinhole will be opened with the use of the DMZ and to the green zone.

3 0
4 years ago
Read 2 more answers
_____________ consists of data that have been processed, organized, and put into context to be meaningful, and to convey underst
Lyrx [107]

Answer:Knowledge

Explanation: Knowledge is the collections of the facts , figure and related data in order to make context regarding any topic. The context of knowledge is organized and formatted in such a manner which can be understood and learnt by the individuals.It is based on the theory or any practical incident to describe the information about it.

E.g.- the remembering of any particular historic incident.

4 0
4 years ago
You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
Rasek [7]

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

<h3>Issue of  internal policy violation</h3>

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

brainly.com/question/13198827

#SPJ1

6 0
2 years ago
Other questions:
  • What is a multipurpose network device?
    12·1 answer
  • Presentation software allows users to _____.
    15·1 answer
  • Select the correct answer,
    14·1 answer
  • Assume that isIsosceles is a boolean variable, and that the variables isoCount,triangleCount, and polygonCount have all been ini
    6·1 answer
  • Your mom wants to start using some type of cloud storage so that she can access
    15·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
    12·1 answer
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
  • WILL GIVE BRAINLIST Which statements accurately describe electronic tools? Check all that apply. Electronic tools collect large
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!