1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
3 years ago
5

C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:

Computers and Technology
1 answer:
monitta3 years ago
5 0

I guess the correct option is letter D.

C:\windows\system32\drivers\etc\protocol is an example of a file path.

You might be interested in
Which phone has the most GB (Gigo Bites)<br><br>A.Samsung<br>B.Iphone<br>C.LG<br>D.ZTE
Lina20 [59]
It's GigaBytes actually. And is it RAM or storage capabilities?

And also those are brands. Not models. For example, Samsung has different phones. Not just one.


7 0
3 years ago
Read 2 more answers
Which of the following is considered a benefit of using simulation programs? a. They allow users to experience potentially dange
erica [24]

Answer:

All of the above

Explanation:

7 0
3 years ago
Calling all technology geeks— whenever I try to take a video; the video becomes muted and the sound button looks like this. Does
Diano4ka-milaya [45]

Answer: Just press on it or sum ig.

Explanation:

3 0
3 years ago
Programmers refer to a sequence of characters as a ____.
jekas [21]
In programming they know it as a String which is  a sequence of characters that are composed of literal constants or some kind of variables. A sting is any finite sequence of characters. every single string has its own lenght and this is one of the most important characteristics of them. Strings are essential to communicate information from the program to the user. 
5 0
3 years ago
________ is a crime that uses mock (fake) sites to trick people into sharing information.
Elan Coil [88]
<span>Phishing is a crime that uses mock (fake) sites to trick people into sharing information.</span>
5 0
3 years ago
Other questions:
  • Why do you think LinkedIn has become so popular?
    6·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • Which of these is NOT one of the three parts to the event-handling mechanism in Java?
    10·1 answer
  • I need an answer and fast What happens if a sequence is out of order?
    5·2 answers
  • Do you watch markiplier?
    13·2 answers
  • When selecting a color scheme for a project which two things should you consider?
    8·1 answer
  • A desktop computer (named workstation22) can’t connect to the network. A network card was purchased without documentation or dri
    15·1 answer
  • You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
    11·1 answer
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • Can geico save me 15% or more on car insurance?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!