1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
8

How to save files to a CD?

Computers and Technology
1 answer:
zepelin [54]3 years ago
6 0
Users can save files to CD-ROMs.
You might be interested in
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data
crimeas [40]

Answer:

Option b is the correct answer for the above question.

Explanation:

RAID is a data storage technology that is used to store the data virtually. It keeps a copy of all data so that the data can be recover when it lost from the physical storage. Generally, logical storage is also physical for the computer system. It means that the disk is divided into two parts some parts of the system are physical and some are logical.

The question asked about the technology which solves the problem of interrupting the service. The technology can be RAID as described above . hence Option b is the correct answer while other is not because--

  • Option 'a' states about RFID technology which use in an electromagnetic field.
  • Option c states about WPA which is a protection mechanism.
  • Option d states about OnTrack which is not a technology.
6 0
3 years ago
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
Umnica [9.8K]

Answer:

Patch finders.

Explanation:

Once Russ accessed a webpage on his computer, he had seen an issue that the page was not associated with the browser variant on which he was executing it, although it was important to use patch finders tool to fix the following problems because patch finder is only the software that can resolve the following issues.

3 0
3 years ago
If you said the bottom margin, you are talking about what?
user100 [1]
The space between the words and the edge of the paper
3 0
3 years ago
Read 2 more answers
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
4 years ago
What are Manuscript signs​
mihalych1998 [28]

Answer: See explanation

Explanation:

Manuscript signs, refers to the marks or the symbols that are used within a manuscript in order to show the necessary corrections which should be made during the preparation of a document.

Manuscript formatting is vital as it makes the manuscript easier to assess. In a situation whereby manuscripts are poorly formatted, it can be turned down by agents and publishers.

5 0
3 years ago
Other questions:
  • A collision volume is called ____
    7·1 answer
  • Which fingers should you use to type the reach keys?
    12·1 answer
  • Testing for information would be most likely to occur in which type of engineering?
    5·2 answers
  • In preparing his persuasive presentation, Reza should most likely focus on clearly presenting his
    6·2 answers
  • When targeting customers of the consumer population at market a product, what type of segmentation information would be most hel
    12·2 answers
  • The radix sort
    7·1 answer
  • Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.
    12·2 answers
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • What is polymerization1​
    11·1 answer
  • You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!