1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
6

When saving a document or drawing, you determine the destination folder in which the file will be saved by?

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
8 0

making a selection in the Save in: box.<span>

</span>
You might be interested in
_____ is the software that protects you computer from harmful files, Trojan horses, and worms.
Bumek [7]
I think it's antivirus because Antivirus means to protect your computer from a deadly virus
4 0
4 years ago
Read 2 more answers
What type of e-mail typically lures users to sites or asks for sensitive information?
Evgen [1.6K]

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

<h3>What is a phishing email?</h3>

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: brainly.com/question/14954901

#SPJ11

8 0
2 years ago
A two-dimensional array of characters can contain Group of answer choices
Ber [7]

Answer: All of these.

Explanation:   Lets take a two-dimensional array alphabet[4][4]

Lets say this array contains the following elements: Example 1

a b c d

l  i  o  n

f e  l   l

s t  e  m

These are the strings with same length. So this 2D array can contain strings of same length.

Now lets take another 2D array Example 2

a b c

h  i  n  t

s  o

e g  g

2D array can have all these above mentioned elements. So it can contain strings of different lengths.

Now consider the Example 2. Some places for the elements are left. This isn't an issue for 2D array. So it can contain uninitialized elements too.

So the answer is All of above.

6 0
4 years ago
Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None
Rudik [331]

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

4 0
3 years ago
What is Microsoft Excel?​
pashok25 [27]

Answer:

The most popular and widely used spread sheet program, developed by Microsoft Corporation of USA is called Microsoft Excel.

Explanation:

Thanks!!!!!

5 0
3 years ago
Other questions:
  • Which of these describes the functionality of a database? Check all of the boxes that apply.
    10·2 answers
  • HELP 25 POINTS!!!!!
    6·2 answers
  • Molly, an end-user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
    5·2 answers
  • PLEASE HELP ME ANSWER AS MUCH AS YOU CAN I ONLY HAVE 3 POINTS LEFT AND IM TIMED. PLEASE TELL ME THE NUMBER AND LETTER. THANK YOU
    5·1 answer
  • Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language
    10·1 answer
  • The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
    6·1 answer
  • Select the correct answer from each drop-down menu. Look at Marta's email signature and fill in the missing elements. Marta D'Ab
    14·2 answers
  • 20 POINTS AND BRAINLIEST TO CORRECT ANSWER
    15·2 answers
  • Virus program do not replicate themselves true or false one word answer only​
    15·2 answers
  • Which workbook view is used most often in Excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!