1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
12

Steps in creating a folder

Computers and Technology
1 answer:
enyata [817]3 years ago
8 0
Right click computer screen and press new folder?
or add paper to rings in the physical folder<span />
You might be interested in
A retailer is able to track which products draw the most attention from its customers through the use of 5g-enabled motion senso
Minchanka [31]

The technology combines with 5g capabilities to allow the monitoring of shopping trends in this way is called internet of things

For better understanding, lets explain what internet of things means.

  • Internet of things is simply known to be a network of Internet-Enabled objects that is often combined along with web services as they often interact with these objects.
  • There is a known development of the Internet where objects always have network connectivity giving them room to send and receive data.

From the above, we can therefore say that the answer The technology combines with 5g capabilities to allow the monitoring of shopping trends in this way is called internet of things is correct.

Learn more about internet of things from:

brainly.com/question/19995128

7 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Write a program called array1.cpp file that use either regular for loop or range based for loop to display the contents of the a
ch4aika [34]

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

void display(int array_test [], int n){

   for(int i = 0; i<n;i++){

       cout<<array_test[i]<<" ";   }

}

int main(){

   int n;

   cin>>n;

   int array_test[n];

   for(int i = 0; i<n;i++){

       cin>>array_test[i];

   }

   display(array_test,n);

   return 0;

}

Explanation:

This defines the display function

void display(int array_test [], int n){

This iterates through the array

   for(int i = 0; i<n;i++){

This prints each element of the array

       cout<<array_test[i]<<" ";   }

}

The main begins here

int main(){

This declares n as integer; n represents the length of the array

   int n;

This gets input for n

   cin>>n;

This declares the array

   int array_test[n];

The following iteration gets input for the array

   for(int i = 0; i<n;i++){

       cin>>array_test[i];

   }

This calls the display function to display the elements of the array

   display(array_test,n);

   return 0;

}

7 0
3 years ago
It can be useful to have a mentor because they will help you
MArishka [77]
Get comfortable quickly
3 0
4 years ago
Read 2 more answers
MDM consolidates data from various data sources into a __________, which then feeds data back to the applications, thereby creat
Pepsi [2]

Answer:b) Master reference file(MRF)

Explanation: Master reference file is the collection of data that persist the schedules records for the maintenance and administration. It is the UDC version tool .

It helps in the managing the data content present in the database, archiving and tracing any changes on the database over certain time.Master data management is the managing of data's integrity .It  send the collected critical data to the master reference files.

Other given options are incorrect because backup file is for creating data backup, central directory is record of the data of users and other information and data silo is kind of fixed data having the governance of any organization.Thus, these factors don't help in the critical information management.Thus, the correct option is option(b).

3 0
4 years ago
Other questions:
  • Read the sentence from the first paragraph of Silent
    6·2 answers
  • What is a good monitor for console gaming? (Any price)
    13·2 answers
  • Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
    12·1 answer
  • 06.04 what's the big idea?
    15·1 answer
  • Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
    15·1 answer
  • Why was unicode invented?
    10·1 answer
  • What is modularity? Help asap
    9·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    15·1 answer
  • During which phase of system development would you acquire any necessary hardware and software?
    11·1 answer
  • A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!