1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
4 years ago
13

Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?

Computers and Technology
1 answer:
joja [24]4 years ago
6 0
First open up your pictures folder, then at the top click on View and select details and it will show you the size of each image
You might be interested in
Who was the inventor of the iPhone?
Over [174]

Steve Jobs and his team at Apple invented the iPhone.

6 0
3 years ago
Read 2 more answers
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
What is self management.​
OLEGan [10]

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

8 0
3 years ago
Read 2 more answers
When you choose a(n) ___________ installation, you only install selected features, rather than all of the features associated wi
lisabon 2012 [21]

Answer:

When you choose a(n) <em><u>custom</u></em> installation, you only install selected features, rather than all of the features associated with a software program.

Explanation:

There are two types of installation while installing a software

1. Default

2. Custom

In default installation, all the features of a software program are installed while when the custom installation mode is selected, the user can select which features of the software he wants to install instead of all features.

So,

When you choose a(n) <em><u>custom</u></em> installation, you only install selected features, rather than all of the features associated with a software program ..

8 0
3 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
Other questions:
  • Which one of these is a mem?
    8·1 answer
  • Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows
    15·2 answers
  • 1.What is a project methodology?
    9·1 answer
  • What is it called when you give credit in your writing to someone else's quote?
    10·1 answer
  • When a fighter pilot crosses into the airspace of another country without permission it can be considered an act of aggression o
    8·1 answer
  • I think these might be the answers but im not to sure, so am I right? or wrong? please help
    11·2 answers
  • ________ development is the term used to describe an information system development methodology that emphasizes flexibility and
    11·1 answer
  • How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
    10·1 answer
  • Third party providers of publicly available data sets protect the anonymity of the individuals in the data set primarily by a. R
    6·1 answer
  • Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comp
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!