1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
7

In microsoft windows, when a window is minimized, which of the following happens to that window?

Computers and Technology
1 answer:
Gnoma [55]3 years ago
3 0

The window doesn't terminate, it just gets smaller and it may be closed at the bottom of your computer screen. All you have to do is click on the closed window at the bottom of your screen to re-open it! :) The window doesn't terminate, it just gets smaller and it may be closed at the bottom of your computer screen.

You might be interested in
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
jeyben [28]

Answer:

The answer is "use P2P method".

Explanation:

In Corporation are starting to regard P2P is a method, which enabling workers to transfer files directly, reducing the expenses and construction connected with a central network.

  • It allows corporations to make the use of often latent resources on both the computer for each worker.
  • It will also be forced to control access to data to protect the privacy and sensitive materials, and will also be able to encrypt files by code.

5 0
3 years ago
Examples of intermediate technology​
Effectus [21]

Example of intermediate technology is the treadle pump, which enables farmers to provide a greater amount of water to their plants more easily compared to watering by bucket, while requiring much less infrastructure than constructing irrigation dams and pipes.

3 0
3 years ago
Read 2 more answers
Who else doin online school
ella [17]

I've been doing it for about.... 4 years now? Maybe 3.

7 0
3 years ago
Read 2 more answers
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
What are availabilities and uses of solar energy/panels? (please explain as much as you can)
mixer [17]
Solar panels can be very useful, an they help reduce the use of other power plants that release pollutants into the air. Solar panels have some cons, as the very good ones that have better cells that can store more energy are more expensive, but it is worth the investment, because a big enough field of panels can power a lot of a things during a power outage.

If anyone else has anything about the availability of solar panels, feel free to add.

Hope this helps :) 
6 0
3 years ago
Other questions:
  • On Sarah’s first day at work she is provided with a range of information technology that she can use to write , edit or create d
    5·2 answers
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • When entering a formula into a cell, you begin with are calculations a spreadsheet program applies to data. are preset calculati
    9·1 answer
  • What is an html skeleton? If you know what it is can you write it for me?
    12·1 answer
  • A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day
    5·1 answer
  • What is the name given to software that decodes information from a digital file so that a media player can display the file? har
    11·1 answer
  • Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that som
    14·1 answer
  • Which of the following safety and privacy features is not included in a P2P app or service?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!