1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
11

What are two ways you can open an application?

Computers and Technology
2 answers:
tigry1 [53]3 years ago
7 0
Use the start menu

use third party launchers
Aleks04 [339]3 years ago
5 0

Method 1: Press the windows key and add a number to launch the application which is opened quickly on your taskbar.

Method 2: Use the start menu.

Method 3: Use third party launchers.

You might be interested in
A(n) ______________ ________________ attack keeps the target so busy responding to a stream of automated requests that legitimat
Tanya [424]

Answer:

denial-of-service (DoS) attacks

Explanation:

8 0
3 years ago
ProcessName2
RoseWind [281]

Explanation:

This is easily solvable with a for loop. Something like:

(I assume c++)

#include <iostream>

#include <string>

int main() {

take_input: //tag

std::string input;

cin >> input; //take the input

int spaceCount = 0;

char checking;

for(unsigned int i = 0; i == input.length(); ++i) {

checking = spaceCount[i];

if(checking == ' ')

spaceCount++;

}

if(spaceCount >= 1 && input.length >= 5)

std::cout << "Your name is " + input;

else

goto take_input; // reasks for input if the conditions are not met

return 0;

};

**remove all spaces before using the code, the if statements are messed up

5 0
4 years ago
Is the disk in the C: drive fixable or removable disk
katrin2010 [14]

Answer:

The disk is a removable disk.

8 0
3 years ago
Read 2 more answers
What does the poster exemplify?
zloy xaker [14]

Answer:

try D

Explanation:

8 0
3 years ago
Read 2 more answers
A backup of sewage in the operations storeroom would be a reason to contact the local regulatory authority because it is conside
CaHeK987 [17]
65, for sure, the number at the end of the rectangle is the q3
6 0
4 years ago
Read 2 more answers
Other questions:
  • In which type of attack do you get malicious code in links from seemingly reliable websites?
    14·1 answer
  • Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would
    7·1 answer
  • The seven basic internal components found in a computer tower
    9·1 answer
  • Question 3
    13·1 answer
  • Help me please I’m failing
    11·1 answer
  • What happen if there is no authentication??
    10·2 answers
  • The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
    14·1 answer
  • A customer dictates instruction on how to transcribe audio. Do you have to transcribe the instruction word for word?
    13·1 answer
  • Importance of folders on a computer <br>​
    10·1 answer
  • Which description best applies to a macro?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!