1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
6

What is a file manger ? The file manger is user A . Medium B.platform C. Interface .

Computers and Technology
1 answer:
zysi [14]4 years ago
5 0

Answer: C. Interface.

Explanation:

File manager is an interface between the hardware part of a computer and the software. the main function of a file manager is to help the user manage all files which they have stored up on their computers. for example the file managers allows the users to view, copy, delete and edit the files which they have stored up on their computer storage devices.

You might be interested in
Why did artists use pinhole cameras during the renaissance?
murzikaleks [220]
<span>Pinhole cameras were one of the most sophisticated devices of the period, it made tasks much easier it basically worked exactly like the human eye and is something just like tracing.

Hope it helps! :)</span>
3 0
3 years ago
A customer service representative for an Internet provider uses various techniques to help a frustrated customer with a slow Int
tia_tia [17]

Answer:

“Think of it this way: When we’re done, your connection will be faster than it ever was before.”

Correct label:

positive reappraisal

“Okay, let’s put the connection speed issue aside for later and work on changing your password for our company website.”

Correct label:

distraction

“At least your router isn’t talking back at you! I can’t get my digital assistant to shut up.”

Correct label:

humor

Explanation:

4 0
4 years ago
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
anastassius [24]

Answer:

Hi,

The best option in the list is <u>stop posting her e-mail address on newsgroups.</u>

Explanation:

Unwanted e-mail is categorized as a spam email.These emails can not be entirely avoided because we use the Internet thus it is recommended that you filter them.A program called my email client can help to filter spam though in some cases, it might not be effective.

The techniques Nadia can employ in this case is to hidden her email address when visiting newsgroups.News groups are forums online where people discuss certain topic.Avoid publishing the email in these web sites can hide her tackle this problem. Additionally, Nadia could train the filter serach feature in her email box through repoting such emails using the report button present, avoid responding/openning spam  or use a third party program to track spam emails and block them.

Wish you Luck!

8 0
3 years ago
Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu
ANEK [815]

Answer:

1) The value of x will be 6.

2) The value of y will be 7.

Explanation:

1) The value of x will be 6.  

The enum values are labeled by default from 1. This means that Sun = 1, Mon = 2, Tue = 3 and so on.  

So, x = Mon = 2 and y = Sat = 6  

x increases up to y = 6 in the while loop.  

and then y also increments by 1.  

2)So the value of y = 7.  

You will need actual printf("Sun") or printf("Mon") for printing the actual text for the enum.

7 0
3 years ago
____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
vekshin1

Answer:

C. Pipes

Explanation:

Pipes are medium of communication between two or more interrelated processes. It is used for communication between operating system components. It is also used in exchanging messages between components of large programs. It implements interprocess communications through an interface. It passes information from one program process to another.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is our goal for a hashing function?
    14·2 answers
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • (20 POINTS AND BAINLIEST)
    9·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • Assign the size of userInput to stringSize. Ex: if userInput is "Hello", output is: Size of userInput: 5
    7·1 answer
  • Who found the first computer bug in 1947, and invented the concept of a compiler in 1952
    6·1 answer
  • What is an information technology? ​
    12·2 answers
  • In which drawer do you find blocks that allow you to use the A and B buttons on your micro:bit?
    13·2 answers
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • Help PLEASE ILL MARK as brainlest
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!