1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
10

Any computer and technology experts?

Computers and Technology
1 answer:
nalin [4]3 years ago
3 0

Answer:

file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled. A folder can also contain other folders, and there can be many levels of folders within folders.

a subfolder is an organizational folder on a computer that is located within another folder

Explanation:

sorry i dont know all

You might be interested in
What is iteration?????
maksim [4K]

Answer:

Iteration is a program repeated untill a condition is met

Explanation:

4 0
3 years ago
Read 2 more answers
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
Irina18 [472]

Answer:

Option A i.e., software package.

Explanation:

Prewritten, available on the market the software packages, which not necessitate a company's desire to actually compose its software for certain functionalities, will be applied to as software packages.

A software package is essentially a finite number of programs or software components that function together so that they achieve different tasks and objectives.

5 0
3 years ago
Security administrators can use either the PowerShell command line or the graphical user interface of the Server Managerâs Roles
AleksAgata [21]

Answer:

Security administrator can use power shell command line or the GUI to "Promote a windows server to a domain controller".

Explanation:

A domain controller is a type of server that is used to authenticate the access of the system to the users to resources of windows. Power shell is an important tool that is used to perform different tasks of administration. We can user this tool as security administrator to Promote a Windows server to a domain controller.

3 0
3 years ago
Which type of digital storage stores information primarily on physical computer components in the photographer's possession?
Lubov Fominskaja [6]

Answer:

Internal Hard Drive

Explanation:

8 0
2 years ago
Creating Classes
barxatty [35]

Answer:

Explanation:

The following code was written in Java. The class created is called Survey. In the constructor it takes in the question in order to create the survey object. The vote method, asks the user for a yes/no response and saves it. Finally, the toString method prints the question and the number of each vote to the screen. Due to technical difficulties I have added the code as a txt file attached below.

4 0
3 years ago
Other questions:
  • When a class declares an entire class as its friend, the friendship status is reciprocal. That is, each class's member functions
    14·1 answer
  • What is the line tool used for in photoshop
    6·1 answer
  • What would be a situation in which you could use an excel chart to present your data
    8·2 answers
  • The steps for moving data from one cell to another are _____.
    6·1 answer
  • What type of system security malware allows for access to a computer, program, or service without authorization?
    5·1 answer
  • Identify the characteristics of logic problems.select all that apply
    5·1 answer
  • 1)Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "positive" otherwise. Examp
    15·2 answers
  • 50 POINTS! What is wrong with this python code? The syntax error is on the first line.
    11·1 answer
  • NEED HELP ASAP! Which field best organizes street addresses in a database?
    7·2 answers
  • Government entities may pressure upstream Internet service providers to _____. a. track and monitor the Internet activities of i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!