1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
12

What are the advanced file and folder search commands?PLEASE GUYS ITS IMPORTANT

Computers and Technology
1 answer:
Inessa [10]3 years ago
8 0

Answer:

bro aur shish if you play free fair please send me a lot as gift to m winner 4545

You might be interested in
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
What is a device that enables a spacecraft crew to exit from the spacecraft and launch tower in the event of a crisis before tak
algol [13]
i think its alternative escape strategy
6 0
3 years ago
Connect research concepts to their definitions
stellarik [79]
Answer Research is defined as the creation of new knowledge and/or the use of existing knowledge in a new and creative way so as to generate new concepts, methodologies and understandings
8 0
2 years ago
Angelika just submitted her product for the first time, and she had 2 errors, 3 warnings, and 5 notifications. What does she nee
KonstantinChe [14]

Answer:

Errors.

Explanation:

Angelika should focus on fixing the errors so that her ads can be shown. Because of the errors the code will not compile fully either be it run time error or compile time error or syntax error or any other error.

Warnings shows the potential problems but the code will run even if there are warnings and the notifications are not to worry about.

4 0
3 years ago
In which type of referencing do you get a warning message? Explain why.​
Art [367]

Answer:

These are the problems that are not severe enough to prevent processing. They mainly complain about the previous version of your document. In the case of command invalid, the latex gives a warning and henceforth it needs to be fixed.

Explanation:

There are some bugs in which they are not that severe that make the system not process.. but they are still mistakes in which might affect how the program run those parts.. like in JavaScript in the program i use, the minor bugs are like symbolized as yellow triangle and they are normally like signalizing a grammar error in the code and the app still runs but just that part of the code is invalid or reads wrong.. while big errors like codes that dont make sense, those make a red squareish that as soon as you try to run the program the debug console states in all red "Line 50(or whatever line) SyntaxError" or other things

5 0
3 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • Write a program that prompts the user for the shift value (e.g. 3) and then a plain-text message to encode. Encrypt the message
    5·1 answer
  • Which of these is NOT an advantage of the impact of computer careers.
    9·1 answer
  • Transistor was the major technology used during the ____ generation of hardware.
    5·1 answer
  • "Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media
    12·1 answer
  • What file does a aac run under
    11·1 answer
  • Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​
    13·1 answer
  • Necesito ejemplos de actitud filosófica por favor
    8·1 answer
  • Private notes about individual slides that you leave for yourself or for others who might use the presentation file is called __
    13·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!