1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
15

When you enter search keywords in the search box of file explorer and the onedrive option is selected?

Computers and Technology
2 answers:
Westkost [7]3 years ago
4 0
<span>When you enter search keywords in the search box of file explorer and the onedrive option is selected, the search will be automatically expanded including the folders which are located in your OneDrive cloud. It's actual for Windows 8, 8.1 and 10. </span>
ddd [48]3 years ago
3 0

The search box which is located at the top right corner of the open window is limited to the selected folder but one can expand the search per user. But when the onedrive options is selected t<span>he search is automatically expanded to include every folder on the hard drive.</span>

You might be interested in
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
Eureka! Is a telephone and Internet-based concierge service that specializes in obtaining things that are hard to find (e.g., Su
svetoff [14.1K]

Explanation:

Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?

8 0
3 years ago
A social media site violates its terms of service by selling information about its users
balu736 [363]
A company violating its terms of service by selling their user’s info is a violation of Digital Privacy
4 0
3 years ago
Please help me with these questions please
ki77a [65]

Answer:

The answer is 20, if this helps you please give the brainliest award.

4 0
3 years ago
A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best
nikitadnepr [17]

Answer:

Option D i.e., Individuals; Interactions is the correct option.

Explanation:

Because Agile Manifesto is the development software tool that is used to reads the line for the individuals and it also interacts with the process of the user. It also used to collaborate with their customers to negotiates the contacts of the customers.

Other option is not correct because they are not related to the following statement.

5 0
3 years ago
Other questions:
  • NEED HELP FAST
    13·2 answers
  • Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
    15·2 answers
  • Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.
    6·1 answer
  • a sign is to be hung from the end of a thin pole, and the pole supported by a single cable. your design firm brainstorms the six
    13·1 answer
  • The first idea for a communications network was called
    14·2 answers
  • You have a small company and want to keep your costs low, but it is important your employees share data. Which network would pro
    5·2 answers
  • Which of the following is the correct binary representation of the number 2?
    14·1 answer
  • Which is the least technically experienced technical support group?
    7·1 answer
  • How was data put into the Tabulating Machine?
    7·1 answer
  • Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she instal
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!