1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
3 years ago
5

C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:

Computers and Technology
1 answer:
monitta3 years ago
5 0

I guess the correct option is letter D.

C:\windows\system32\drivers\etc\protocol is an example of a file path.

You might be interested in
What language used orthogonality as a primary design criterion?
pogonyaev
LIPS a functional language is one in which computations are made primarily by applying function to given program
4 0
3 years ago
Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output i
Nitella [24]

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

4 0
3 years ago
Read 2 more answers
Which of the following is an example of data an Earth-observing satellite would collect?
Natalka [10]

Answer:

A

Explanation:

Hopefully this helps

4 0
3 years ago
7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
Art [367]
This program will the string array in the given format.

int main(void){
char arr[6];
int counter;
strcpy(arr[], "ARRAY");

for(counter=0; counter<6; counter++){
printf("%c", arr[counter]);
}

return 0;
)

Note: Do not forget to include all the necessary library that is needed to run this program.

6 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Other questions:
  • You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation
    12·1 answer
  • What would I need to make the perfect music video
    10·1 answer
  • What is the simplest way to convert a decimal number in a binar one in c++?
    8·1 answer
  • Which of the following journals is not aimed at the public as well as scientists?
    7·1 answer
  • Question 4 of 20
    5·1 answer
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • In Python, parentheses are used in calculations where the order of operations affects the outcome. (5 points)
    9·1 answer
  • I want to get an output picture in python but it says this. I'm using turtle
    12·1 answer
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!