1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
10

একটি ডকুমেন্ট তৈরী করে ড্রাইভে সেভ করার পদ্ধতি বর্ণনা করো

Computers and Technology
1 answer:
kotykmax [81]3 years ago
4 0

Answer:

To create a document, you have to go into Google Docs and make a new document, and then it automatically saves to Drive for you.

Explanation:

You might be interested in
If I use the command right(90), which way will Tracy turn?<br> If correct I mark brainlist
Kaylis [27]

Answer: Right

Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...

5 0
2 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
You have this code in your program.
earnstyle [38]

The line code will create array is G = array('f',[2.5, 3, 7.4])

<h3>What is meant by array ?</h3>

As opposed to defining distinct variables for each value, arrays are used to hold numerous values in a single variable. Set the data type (such as int) and the array name, followed by square brackets [, to construct an array.

An array is a collection of elements with the same type that are kept in nearby memory  locations and may each be separately referred to using an index to a special identifier. There is no need to declare five distinct variables when declaring an array of five int values (each with its own identifier).

In the C programming language, arrays are a derived data type that may contain primitive data types like int, char, double, float, etc.

To learn more about array refer to :

brainly.com/question/28061186

#SPJ1

6 0
1 year ago
Write an expression that prints 'You must be rich!' if the variables young and famous are both True.
Rufina [12.5K]

Answer:

Following are the expression to this question:

if (young and famous==True):

Explanation:

For print, the given expression the code requires some modification that can be defined as follows:

young = True#defining a bool variable that holds a value True

famous = True#defining a bool variable that holds a value True

if (young and famous==True):#defining if block that check variable value

   print('You must be rich!')#print message

else:#else block  

   print('There is always the lottery...')#print message

Output:

You must be rich!

Code explanation:

In the above-given code, two variable "young and famous" is declared, that hold a "True" which is a bool value, in this code, a conditional statement has used, that checks variable value, which can be defined as follows:

  • In the if block, it uses the above declared variable with and gate to check its value is equal to true.
  • If the condition is true, it will print the true block message, otherwise, go to the else block in this, it will print the else block message.
4 0
3 years ago
You currently are IT support for Richman Investments, a brokerage firm that employs 20 brokers. Each broker has their own client
lions [1.4K]

Answer:

Use the System Restore tool to restore the affected computers back to a point before the problematic updates. To forestall issues with problematic updates, one needs to install and configure the Windows Server Update Services (WSUS) Server role.

Explanation:

Windows Update creates a restore point prior to applying any updates and this makes it easier to rollback any problematic updates using the aptly named System Restore utility.  System Restore can be launched either from within Windows or during startup depending on whether the computer can be booted  or not.

One solution to preventing this kind of problem is the implementation of a Windows Server role, the Windows Server Update Services (WSUS), which helps administrators to safely manage Windows Update for clients within its network. WSUS allows administrators to test updates for issues and approve them before they are available for deployment to clients.

4 0
3 years ago
Other questions:
  • The first step in the five-step process for problem solving is to ____. evaluate take action understand the task or need complet
    10·2 answers
  • What is the main purpose of broadcasting via satellite? A. To enable signal reception at night B. To convert analog signals to d
    5·1 answer
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • What could be one rule to help your friend to blog safely
    6·2 answers
  • Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highe
    6·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • An internet connection is required to access which type of software?
    5·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • Give me two reasons why return statements are used in code.
    10·2 answers
  • The _________________ creates international guiding principles for computer forensic examiners.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!