1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
11

Which fingers do you use to type the following letters rtgvf

Computers and Technology
1 answer:
Allushta [10]3 years ago
3 0
Middle,index,index,thumb,middle
You might be interested in
How is Office 365 different from Windows Live Office?
Scilla [17]
<span>Office 2016 is the traditional Microsoft Office product that is sold for a single time fee up front. One pays to purchase it and can install it on one single PC or Mac to use for as long as they would like, it has no expiration date. Office 365 has no hefty up front fee, instead one is charged a monthly or annual fee to get access to the most up to date version of the product. Therefore, the answer is B.</span>
6 0
3 years ago
Imagine that you are about to make a presentation during an online meeting, where people will need to be able to see you, and yo
djyliett [7]

Answer:

You would check your devices / features in your settings to see if your camera is enabled, connected, or working.

Run a diagnostics scan to see if anything is affecting your camera.

Clear cookies.

Call a technician.

5 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Why does the media play such an important role in our personal freedom? Select 3 options.
Helga [31]

Answer:

It promotes self-expression

It holds the government accountable

It keeps us informed

Explanation:

I got them right Ed

7 0
2 years ago
What is the difference between a hard drive and a tape drive? Hard drives use magnetic heads and are fast to write data; tape dr
liraira [26]

Answer:

A tape drive provides sequential access storage, unlike a hard disk drive, which provides direct access storage. A disk drive can move to any position on the disk in a few milliseconds, but a tape drive must physically wind tape between reels to read any one particular piece of data.

Explanation:

Architecturally tape drives are sequential storage, meaning that if you need to access some data at the end of the tape you needed to seek to the end and retrieve it. This can take seconds or minutes. Disks, OTOH are random access. Some hard drives use rotating media and movable heads , so the seek times are instantaneous , at least compared with tape drives. However, like tapes, there is a big advantage to using a rotating hard drive as sequential storage. It takes time, measured in milliseconds, for a head to move to another track. So traditionally, random access is much slower than sequential access.

SSDs have no internal moving parts so random access occurs in the same time frame as sequential access. Moreover, these drives usually have very high performance. For example, they can saturate a SATA data link, meaning that the SATA connection to the motherboard is now a bottleneck in disk access.

At one time tape drives were very popular. They were a low-cost alternative to using disks as backup. They were especially useful when IBM invented the Winchester “fixed” drive. This meant that the hard drive is fixed within its enclosure like they are today. Prior to this one could remove the drive pack and replace it. This was helpful when upgrading to a new version of the operating system as it was simple to replace the older drive pack should there be a problem.

Tape drives can be used in larger data centers, due to the fact that tape volumes can be removed and replaced so that the actual tape drive can backup many disk sets. Also the tape volumes can be stored off-site or in a fire-proof vault so this is valuable in a data recovery scenario.

4 0
3 years ago
Other questions:
  • ​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent
    11·1 answer
  • True or false
    7·1 answer
  • Which statement below is inaccurate? a. Web 2.0 is a simple static website without any interaction with its users b. Web 2.0 bri
    5·1 answer
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • Under the advanced options screen, what startup option should be enabled in order to view what did and did not load during the b
    12·1 answer
  • How to download goose simulator the game for free<br><br>pls tell me
    6·2 answers
  • Which of the following has the honor of the first robot-human handshake in space?
    10·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!