1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
9

What typically happens by default when a file is double clicked in Microsoft Windows?

Computers and Technology
1 answer:
Ket [755]3 years ago
3 0
<span>When a file is double clicked in Microsoft Windows typically the file opens or executes.</span>
For many people the<span> time in which they have to do two quick clicks of the left mouse button is too short. </span>
There is an option to adjust<span> the </span>double-click speed.<span> This can be done on the Buttons tab, under </span>Double-click speed.
You might be interested in
To what would you compare the transport layer?
GarryVolchara [31]
The above question has multiple choices as below

<span>A. Data links
B. The post office
C. Driving a car
D. A train

The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcels and letters at the agreed delivery deadlines. It also notices any dropped info and re-transmits it.
Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.

</span>
4 0
2 years ago
Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after
bagirrra123 [75]

Answer:

input mask

Explanation:

Microsoft Access is a database application used to stored data. It is a relational database with rows and columns of data tables in its database.

Data validation is a tool in Access used to put a constraint on how data is entered in the table. The input mask is a data validation type that forces users to enter data in a specified format for a given field or column.

7 0
2 years ago
Read 2 more answers
J=2
leonid [27]

Answer:

yup

tthast right

Explanation:

5 0
2 years ago
Consider the latency model for static congestion windows. If the server receives an acknowledgement for the first data segment i
Angelina_Jolie [31]

Answer:

Latency of an object O is shown below.

Explanation:

W segment and stalled state transmits nothing and waits for acknowledgement. The latency is 2 R TT + the time required for server that are using to transmit the object + the amount of time when server is in stalled state. Let K be the number of window that is K= O/WS .The serveries stalled state where K-1 is period of ime with period lasting RTT-(W-1)S/R

latency = 2RTT +O/R +(K-1)[S/R +RTT - WS/R]

After combining the two case

latency = 2 RTT + O/R + (K-1)[S/R +RTT - WS/R]

where [x] means maximum of (x.0). This is the complete ananlysis of the static windows.

server time for transmit the object is (K-1)[S/R +RTT - WS/R]

7 0
3 years ago
(iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
Svetlanka [38]

Answer:

(b) 64000

Explanation:

Assuming that the "Memo" being mentioned is a Microsoft Access memo field, it can hold up to 64,000 characters, even in the more recent version of the application where the "Memo" is now know as the "Long Text" field.

According to microsoft.com, "In earlier versions of Access, we used the Memo data type to store large amounts of text... the Long Text field works the same as the Memo field of old... [it] can only display the first 64,000 characters."

<em>Please put "Brainliest" on my answer if it helped you out the most!</em>

<em>(Further Reading) If you're still confused, I suggest you search up the following:</em>

<em>- Microsoft Access Long Text character limit</em>

7 0
2 years ago
Other questions:
  • In a paragraph of no less than 125 words, describe how technology helps business professionals to be more efficient. Include exa
    12·2 answers
  • William found out that someone used his report on American culture without his permission. What is William a victim of? A. plagi
    7·2 answers
  • Which best describes a difference between transcription and DNA replication
    8·2 answers
  • I wanna start answering questions for people, but I don't quite know how. Can you help me?​
    13·1 answer
  • Mihaela I. Croitoru – Utilizarea calculatorului personal Microsoft Word dau coroana
    14·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • Which line in the following program will cause a compiler error? 1 #include 2 using namespace std; 3 int main() 4 { 5 int number
    12·1 answer
  • Why might a company choose Linux for its operating system instead of Microsoft Windows or Mac OS? The company's employees can sy
    13·1 answer
  • BRIANLIEST!!!!!!!!!!!!!!!!
    12·2 answers
  • Common names for computer-based information systems are transaction processing, management information, ________, and executive
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!