1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
5

By what other name can the folders in Windows 7 be called?

Computers and Technology
1 answer:
Levart [38]3 years ago
3 0

I think document folder

You might be interested in
Jen's laptop that is wirelessly connected to the home network router and turned on; her husband's PC, which connects to the rout
SVETLANKA909090 [29]

Answer:

The network is a LAN.

Explanation:

Computer networks are interconnection and intercommunication of computer devices to share resources. There are several types of computer networks, they are, LAN or local area network, WAN or wide area network, PAN or personal area networks, etc.

A LAN is a network of computer devices ranging from a floor of a building to the building of more. WAN is a network of LANs while a PAN is just a short 10-meter network between two Bluetooth connected devices.

The network described in the question is a wireless LAN or WLAN which is still a local area network.

8 0
3 years ago
What are the two types of lighting?
RideAnS [48]

The answer to this question is E

7 0
4 years ago
Read 2 more answers
Choose the type of attack that is based on entering fake information into a target network domain name server?
SSSSS [86.1K]

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

4 0
3 years ago
The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resi
pickupchik [31]

Current (I) = 0.25 ampere (A)

Power (P) = 3 watt (W)

Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm =  0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm =  3 watt (W)

6 0
3 years ago
Bob is stationed as a spy in Cyberia for a week and wants to prove that he is alive every day of this week and has not been capt
Kay [80]

Answer:

See explaination

Explanation:

The foremost thing to do is to produce a public key and a private key pair H+ and H-and encrypts H+ along with hash of the password ( paswrd) such as H(paswrd)(H+)

When the boss maks use the password hash to gain H+, this will produce a symmetric key P and encrypts it with H+ in the public key cryptosystem and result could be further encrypted with password hash.

If Bob employs the password hash and H- to obtain H from H(paswrd)(AEK+(H)); then he can employ H to send messages to Boss. Furthermore a signature algorithm can be employed to encrypt for signing messages.

5 0
4 years ago
Other questions:
  • When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is
    5·1 answer
  • A machine that is used to print newspaper is a
    12·2 answers
  • Rapid development programming languages eliminate the possibility of having bugs in code. True or False
    8·1 answer
  • Select the correct answer,
    14·1 answer
  • Give an original idea for an app idea to do with sports, please.
    9·1 answer
  • If you used a peach as a model of an animal cell, what would the peach's skin represent? A.nucleus B.cell wall C.cytoplasm D.cel
    10·2 answers
  • Pls help due tonight<br>Will give brainiest
    13·2 answers
  • Please help me with this
    6·1 answer
  • How did transistors revolutionize the world of computers?
    15·1 answer
  • 04. Suppose a computer program needs to sort a list of student records in ascending order
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!