1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
13

(100 points) why does file explorer look like this and how do I fix it? I'm not good with computers, and I kinda need help

Computers and Technology
1 answer:
Degger [83]3 years ago
7 0

Go To View -> Navigation Pane -> Then Click Navigation Pane

You might be interested in
Engineers use science to ______ things that people use.
jek_recluse [69]

Answer:

Not 100% sure but I think it is either to solve things that people use or improve things that people use

Explanation:

8 0
3 years ago
Which describes the "Network Effect?
KIM [24]

Answer:

phenomenon

Explanation:

Increased numbers of people or participants improve the value of a good or service.

3 0
3 years ago
Any anime weebs wanna talk
erastova [34]

Answer:

Sowwy, it's not Me!

The Bermuda Triangle, also known as the Devil's Triangle, is a loosely defined region in the western part of the North Atlantic Ocean where a number of aircraft and ships are said to have disappeared under mysterious circumstances. Most reputable sources dismiss the idea that there is any mystery.[1][2][3]

Bermuda Triangle

Devil's Triangle

6 0
3 years ago
Read 2 more answers
When a policy setting in Computer Configuration and User Configuration in the same GPO conflict, the Computer Configuration poli
Maru [420]

Answer:

True

Explanation:

Computer Configuration policy applied first. This happens when the Computer system boots up. Then the user policy is applied when the user logs on. This takes place when the user object is in the same organizational unit.

So Computer Config policy setting takes precedence. User configurations is applied to local users only while computer configuration is applied to the machine itself. First the Computer GPO is applied and then the User GPO.  Loopback processing in replace mode enforces the Computer GPO over the user GPO.

8 0
4 years ago
What technological invention allowed for the prevalence of automation
julsineya [31]
The automated flour mill created by Oliver Evans in the mid-1780’s?
8 0
3 years ago
Read 2 more answers
Other questions:
  • A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
    14·1 answer
  • What is scratch in information system .
    14·1 answer
  • What career cluster does a fish and game warden fall in?
    14·1 answer
  • ¿Por qué es importante generar proyectos innovadores?
    8·1 answer
  • Completed the given flowchart using the algorithm steps which is given in wrong order. 1.Input time 2.Stop 3.Print "Good morning
    8·1 answer
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • Select the correct answer.
    9·1 answer
  • What is computer? Write is features <br><br><br><br><br>​
    14·1 answer
  • How to hide location on iphone without them knowing?.
    5·1 answer
  • What version of bluetooth is installed on the yaesu ft-5dr?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!