1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
4 years ago
11

How do you know how much space is on the computer

Computers and Technology
2 answers:
sashaice [31]4 years ago
8 0
All the info should be online and or the box
Vladimir79 [104]4 years ago
5 0
Depending on which computer you have you can go into settings and check the data tab or it should be on the box how much it comes with :)
You might be interested in
Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
vaieri [72.5K]

Answer:

Bartering is the correct answer.

Explanation:

Kai is the engineer that setup his company of IT and his friend who sells the goods for his company. Then he decided to develop a software of the stock management for his friend's store for this his friend gives the required office goods and equipment for his company. So, the bartering is best suited for the following statement.

8 0
4 years ago
Read 2 more answers
Complete the printtictactoe function with char parameters horizchar and vertchar that prints a tic-tac-toe board with the charac
lora16 [44]
Void printtictactoe(char horizchar, char vertchar)
{
int i,j;
int scale = 5;

for(j=0; j<3; j++) {
   for (i = 0; i < scale; i++)
      printf("%*c%*c\n", scale+1, vertchar, scale+1, vertchar);
      if (j < 2) 
         for (i = 0; i < (scale * 3)+2; i++)
             printf("%c", horizchar);
             printf("\n");
    }
}

I left out many braces because of the layout issues with this website. There is a scale factor you can set to the desired size of the board cells!
3 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
4 years ago
15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​
kramer

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

7 0
3 years ago
Read 2 more answers
Can web sites contain copyright material? <br> Yes <br> No
Maru [420]
Yes they can contain copyright
6 0
3 years ago
Read 2 more answers
Other questions:
  • Spencer is a recent graduate who finds a dream car that costs $45,000. Even better, there's a 0% APR for 36 months offer from th
    13·1 answer
  • James was having coffee and overhead a conversation between two men who talked about the fact that their friend could not find a
    10·1 answer
  • When computers are connected and operate through one main computer, it is called a _________ network
    14·2 answers
  • Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likel
    14·1 answer
  • Briefly describe the software quality dilemma in your own words
    13·1 answer
  • In the movie, Willy Wonka and the Chocolate Factory, Augustus Gloop leans over the chocolate river to get a drink and falls in.
    11·1 answer
  • Which of the following is NOT a semantic reason for using header tags
    7·1 answer
  • You have a screen and a pen, which is an instance of the Turtle class.
    13·2 answers
  • What will happen when you run this program?
    12·2 answers
  • In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!