1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
6

You want to save twenty of your vacation pictures on your computer. Which is the best place to save them?

Computers and Technology
2 answers:
Hitman42 [59]3 years ago
6 0
The best place to save you pics would be on a flash drive that way just incase you happen to get a new computer you still have your pictures 

hope this helps

Ira Lisetskai [31]3 years ago
4 0
In a folder under your documents. 

Hope this helps.

Have a good day
You might be interested in
Write the generation in which transistors were used!
Lena [83]
I think it’s lid identifier but I don’t know
7 0
3 years ago
Given the availability of an ofstream object named output, write the other statements necessary to write the string "3.14159" in
mixas84 [53]

Answer:

The statements are given below:

output.open("pi"); // opening the file by the of stream object

output << "3.14159";  

output.close(); // closing the file  

Explanation:

In this we open the file with the help of output stream object .The statement output.open("pi"); is opening the file after after opening the file "pi". The output object print the 3.14159 message in console and finally the output stream file is close with the help of output.close() statements .

4 0
4 years ago
What ip address cidrs are not allowed to be communicated with by our malware?
dalvyx [7]

For this project an analysis tool must be used that will do the analysis for you. Following the provided set of access rules -A FORWARD -s 192.168.56.0/24 -d 130.207.0.0/16 -j DROP above rule will drop every packet from the source IP range (192.168.56.0 to 192.168.56.255) and having destination IP range (130.207.0.0 to 130.207.255.254).

4 0
3 years ago
If I gain a rank and go under the points that the rank coust do I lose the rank
padilas [110]
This is a good question, and I've wondered about that myself. I'm going to 'report' the question, not because there's anything wrong with it, but to bring it to the attention of the Moderators, so they can tell both of us.
4 0
3 years ago
Read 2 more answers
Consider the following business environment.
ale4655 [162]

Answer:

Check the explanation

Explanation:

C-> OLAP systems allow users to analyze database information from multiple database systems at one time. The primary objective is data analysis and not data processing.

D-.Airlines use the Data Mining Techniques to improve Customer Service.

Kindly check the attached image below to see the step by step explanation to the question above.

7 0
3 years ago
Other questions:
  • The basic components of cartridges and shotshells are similar. Shot pellets and a bullet are examples of which basic component?
    13·1 answer
  • A ________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the custom
    11·1 answer
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    13·2 answers
  • Write a program to enter a number and test if it is greater than 45.6.if the number entered is greater than 45.6 the program nee
    13·1 answer
  • if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo
    7·1 answer
  • You must write a pseudocode process called swapSort which should sort a list of numbers using an algorithm called swap sort.
    13·1 answer
  • Match each statement from the passage with the message it represents.
    10·1 answer
  • 1. What are the main uses for Protein in the body?
    13·2 answers
  • Jim is working on a network design for a small office running a Windows file and printer server with Internet
    15·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!