1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
6

Explain the4 waysways of arranging icons.​

Computers and Technology
1 answer:
malfutka [58]3 years ago
3 0

Answer:

There are 4 ways of arranging icons:

  1. By name.
  2. by type.
  3. by date
  4. or by size.

Explanation:

Click right-click a blank desktop area and then click Arrange icons to arrange icons for name, type, date, or size. Click on the command to show how the icons should be organized (by Name, by Type, and so on).

Click Auto Arrange to set the icons automatically. Click Auto Arrange to remove the checkmark if you want to set the icons alone.

HOW TO ARRANGE ICONS ON LAPTOP'S DESKTOP:

  • Right-click the Desktop and from the resulting shortcut menu select View; make sure that Auto Arrange Icons are not selected.

         Destroy it before proceeding to the next step if selected.

  • Click on the desktop with the righ-click.
  • Choose Sort-by from the resulting shortcut menu and then click on the desktop shortcut criteria.
  • Any icon can be clicked and dragged to a different place on your desktop, for instance, to separate your favorite game from other desktop icons to help you easily find it.

You might be interested in
Define ROM and list the types of read only memories.
Lorico [155]

Answer:

Read-only memory, also known as ROM, is a storage medium used in computers and electronic devices, which allows only the reading of information and not its writing, regardless of the presence or not of an energy source.

The data stored in the ROM cannot be modified, or at least not quickly or easily. It is mainly used to contain firmware (a program that is closely linked to specific hardware, and is unlikely to require frequent updates) or other vital content for device operation, such as programs that start up the computer and perform diagnostics.

There are three types of ROM memories: PROM. EPROM, and EEPROM.

6 0
3 years ago
In a __________ attack, data that can modify how applications or services operate is downloaded (stored) onto the targeted serve
katovenus [111]

Answer:

The answer is "Cross-Site Coding Persistent"

Explanation:

This coding is also known as an XSS, it is a threat, that converts the files into harmless pages by injecting malware.  

  • This type of scripting is used by the hacker, that passes malware to a different final consumer with a web app, which is typically used by the client end-script.
  • It is very dangerous because the information can be transmitted to a specific repository, which may change by apps and services work.
6 0
3 years ago
Sarah has to add a picture from her computer file and add a caption to it. Arrange the steps in a correct sequence.
SVEN [57.7K]
Click Insert
click Picture
click From File
select the desired picture and again click insert
right-click the picture
click Insert Caption
write the caption and add it
5 0
3 years ago
Read 2 more answers
A goal is best described as
Maru [420]

I'd believe it is:

An accomplishment a student works to complete within a certain time. I got this on my edge unit quiz. Sorry if its incorrect <3

3 0
3 years ago
Services such as water, electricity, and phone communications are called:
pashok25 [27]

Answer:

Utilities

Explanation:

4 0
4 years ago
Other questions:
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N
    11·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources a
    15·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • "On a TCP/IP network, which of the following are used by a router to determine the destination of a packet?"
    14·1 answer
  • As a student you are able to earn extra money by assisting your neighbors
    6·2 answers
  • In object-oriented programming, the object encapsulates both the data and the functions that operate on the data.
    10·1 answer
  • What if the result of conectivity testing is 100%Loss?Explain.​
    14·1 answer
  • Open a Python interpreter. Python can show you the set of currently known names if you type dir(). While these values may vary f
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!