1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
3 years ago
14

______ means locating a file among a set of file​

Computers and Technology
1 answer:
andreev551 [17]3 years ago
8 0

Answer:

computer files

Explanation:

You might be interested in
Bill needs to make a presentation in which he has to represent data in the form of a pyramid. Which feature or menu option of a
andreyandreev [35.5K]

Answer:If you need to use arrows in a chart, which feature or menu option of a word processing program would you use?

A.  

Picture

B.  

Shapes

C.  

Clip Art

D.  

SmartArt

E.  

Charts

Explanation:

7 0
3 years ago
When you install the ipam server feature you will be prompted to install which other features? (choose all that apply.)
Nezavi [6.7K]

If you install the IPAM  server feature you will be prompted to install the other features are:

  • Option c. Group Policy Management
  • Option d. Windows Internal Database

<h3> Which server should a person install the IPAM server feature?</h3>

IPAM Server is known to be one that need to be installed on a kind of server known as the domain member computer running Windows Server.

One can also install it its later operating system. The IPAM server is said to be made as a single purpose server and it is one that need not be installed with other form of network infrastructure roles e.g.  DNS.

Hence, If you install the IPAM  server feature you will be prompted to install the other features are:

  • Option c. Group Policy Management
  • Option d. Windows Internal Database

Learn more about server  from

brainly.com/question/15243924

#SPJ1

See full question below

When you install the IPAM Server feature you will be prompted to install which other features? (Choose all that apply.)

a. Control Flow Guard

b. Scale Out File Server

c. Group Policy Management

d. Windows Internal Database

c. Group Policy Management

d. Windows Internal Database

8 0
1 year ago
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
IRINA_888 [86]

Answer:

The correct answer to the following question will be "Access".

Explanation:

  • Registered users have legal access to a network, while hackers may access a system illegally. The capacity is controlled by access controls. Access is defined as the right of a subject or object to use, manipulate, modify, or influence another subject or object.
  • Access control was the selective limitation of access to a location or other property while the mechanism is represented by access management. Access act may mean use, entry, or use. Permission is called authorization to access a resource.

Therefore, Access is the right answer.

5 0
3 years ago
Although it is not a term Excel uses, how do most people think of Excel?
kobusy [5.1K]

They think of it as a spreadsheet

5 0
2 years ago
Can u please answer this​
Ivanshal [37]

Answer:

this worksheet can be found online

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which does the histogram resemble the most?
    10·1 answer
  • What is a correlation and how does it relate to inferential error?
    5·1 answer
  • True or False? In a C++ floating-point constant, a decimal point is not required if exponential (E) notation is used
    13·1 answer
  • A new drug to combat acne has been developed from a compound that is found in a melon. Which scientists would contribute to the
    15·2 answers
  • What is wrong with my code...
    9·1 answer
  • Can someone please help me with 6.8 Code Practice adhesive.
    14·2 answers
  • When you purchase donuts, they come in boxes of 12, so 24 donuts take 2 boxes. All donuts need to be in a box, so if you buy 13
    10·1 answer
  • You have a host device with an assigned IP address of 192.168.15.100 and a subnet mask of 255.255.255.192. To what network does
    13·1 answer
  • Simple example of hybrid computer​
    7·2 answers
  • You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!