1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
11

PLLLZZZ HELPPPP!!!! WILL MARK AS BRAINLIEST1!REWARD 20points

Computers and Technology
2 answers:
LenaWriter [7]3 years ago
8 0

Answer:

save and save as are the same in the first place. but if you save something and then try to save again it will overwrite on the first saved file. but if u select save as you can save it in another directory with another name

Marianna [84]3 years ago
8 0

Answer:

Save is a command in the File menu of most applications that stores the data back to the file and folder it originally came from. On the other hand, Save As is a command in the File menu of most applications that allows to store a new file or to store the file in a new location.

Explanation:

You might be interested in
A _____ is the viewing area for a web page, which is much smaller on a phone than on a traditional desktop.
-BARSIC- [3]
A viewport is the viewing area for a web page, which is much smaller on a phone than on a traditional desktop .
6 0
3 years ago
How do hardware and software work together to allow a user to perform a function?
qaws [65]

Answer:

jointly

Explanation:

Because Hardware and Soft ware have to JOIN together to make something work

I hope i helped!

4 0
3 years ago
Read 2 more answers
The part of the computer that contains the brain, or central processing unit, is also known as the A. monitor. B. keyboard. C. m
Paul [167]

The part of the computer that contains the brain, or central processing unit, is also known as the system unit. Correct answer: D

The system unit contains the main components of a computer. The keyboard, mouse and monitor on the other hands are the peripheral devices.  The system unit contains the CPU, motherboard, hard drive, and RAM.

6 0
3 years ago
Read 2 more answers
A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
professor190 [17]

Answer:

wireless replay attack

Explanation:

Based on the scenario being described within the question it can be said that the type of attack that is being described is known as a wireless replay attack. Like mentioned in the question this is a network attack where an individual hijacks data in the middle of it being sent in order to copy it before the data reaches the intended recipient. This information can then be used for whatever the attacker intends.

6 0
3 years ago
Read 2 more answers
______ is the code that a user writes in order to create a document to display on the web
icang [17]

HTML(Hyper Text Markup Language) is the code that a user writes in order to create a document to display on the web.

Explanation:

HTML is a markup language used to create hyper texts that are platform-independent. Mark up feature can be linked to other web pages, e-mail, multimedia, documents, databases etc.

Tags are used in to identify each section like head, body, title, paragraphs, tables, images etc.

5 0
3 years ago
Other questions:
  • 3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
    13·2 answers
  • Most internet connections use what transmission
    13·2 answers
  • Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
    7·1 answer
  • Negative glue effects
    8·1 answer
  • Adam, a flower shop owner, wants to drive phone calls to his store. Which Adwords tool should he use to track how many calls res
    15·1 answer
  • If anyone wants to ft heres the link
    6·1 answer
  • What type of movement does the output produce
    10·1 answer
  • computer is an electronic machine that is used for data processing to produce meaningful information explain in statement​
    5·1 answer
  • A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
    11·1 answer
  • a domain name is assigned to you when you submit your website to a search engine. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!