1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
6

Explain the4 waysways of arranging icons.​

Computers and Technology
1 answer:
malfutka [58]3 years ago
3 0

Answer:

There are 4 ways of arranging icons:

  1. By name.
  2. by type.
  3. by date
  4. or by size.

Explanation:

Click right-click a blank desktop area and then click Arrange icons to arrange icons for name, type, date, or size. Click on the command to show how the icons should be organized (by Name, by Type, and so on).

Click Auto Arrange to set the icons automatically. Click Auto Arrange to remove the checkmark if you want to set the icons alone.

HOW TO ARRANGE ICONS ON LAPTOP'S DESKTOP:

  • Right-click the Desktop and from the resulting shortcut menu select View; make sure that Auto Arrange Icons are not selected.

         Destroy it before proceeding to the next step if selected.

  • Click on the desktop with the righ-click.
  • Choose Sort-by from the resulting shortcut menu and then click on the desktop shortcut criteria.
  • Any icon can be clicked and dragged to a different place on your desktop, for instance, to separate your favorite game from other desktop icons to help you easily find it.

You might be interested in
Complete the steps to evaluate the following
kirill115 [55]

Answer:

log base 3a= -0.631.log a/3 base 3

Now, -log m= log 1/m

hence,

log base 3a= 0.631.log 3/a base 3

log base 3a/log 3/a base 3 =0.631

log base 3 ( a.3/a) =.631 since, log m/logn =log n(m)

log base 3 3=0.631

Hence, answer is log base 3 3=0.631

Explanation:

Please check the answer section.

3 0
3 years ago
Read 2 more answers
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
As Kaydence reads a chapter in her anthropology text, she draws a network diagramming the relationships among the concepts descr
german

Answer:

visual encoding

Explanation:

According to my research on the three types of encoding methods, I can say that based on the information provided within the question Kaydence is best described as capitalizing on visual encoding. Which is the act of associating a certain something with a picture in order to store it into memory, as opposed of associating it with sound or words. In this situation Kaydence is associating it with a networking diagram she drew.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Powerpoint increased the weight of a line in ____ increments.
USPshnik [31]
<span>One-fourth increments</span>
4 0
3 years ago
What should a pwc operator do to minimize the risk of accident or injury?
Natasha_Volkova [10]
PWC stands fro personal water craft (aquascooter, jet bike, jet ski, wave runner, ski free, motorised surfboard etc.). The operator of PWC must be at least 16 years old.
In order to minimize the risk of accident or injury the PWC operator must follow several rules:
- the pwc operator should know the boating rules
- to monitor the speed of the vessel to ensure that a safe speed is being maintained.
- to adhere to the 5 knot rule (approximately 10kph) when close to shore, other boats (including boats at anchor) around dive flags and swimmers, fixed structures (ramps and jetties)
3 0
3 years ago
Other questions:
  • What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
    7·1 answer
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • "what is the #1 resource used when researching a product online?"
    5·1 answer
  • How do you tack pictures for this app
    15·1 answer
  • A network consists of 10 computers, all running windows 7 professional. one computer acts as a file server and serves up data to
    6·1 answer
  • I’m turning my Pinterest into a professional account what should be my user name please try to think of a good name and not just
    11·2 answers
  • Expain the application areas of ICT in education sector and E-commerce​
    12·1 answer
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
  • What is the difference between margin and padding property?
    7·1 answer
  • Edit the program provided so that it receives a series of numbers from the user and allows the user to press the enter key to in
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!