1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
7

Which letters name the drive where windows most commonly stores data and programs

Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
6 0

Hi,

Answer: C.

<u>My work:</u> There were two drives by the names of A and B, but later they created Drive C.

I Hope I Helped!

lubasha [3.4K]3 years ago
5 0

Hello!

I believe the correct answer is C.

I hope it helps!

You might be interested in
You can add additional design elements to a picture by adding a color background, which is accomplished by using what Paint feat
katrin2010 [14]

Answer:

Fill with Color tool

6 0
3 years ago
Which of the following are some popular debugging techniques?
topjm [15]

Answer:

a fix any syntax bugs. I looked it up on the internet so you should be good good luck on your test

8 0
2 years ago
Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
Maksim231197 [3]

Answer:

Question is incomplete. it needs a topology diagram and also it needs Router R1 table. I assume User has access to the topology and Routing table.

Below Configuration will help to fix ACL problem

Hosts from the 172.16.0.0/16 network should have full access to Server1, Server2 and Server3 but this is not currently the case, as L1 can’t communicate to Server2 or Server3.

Explanation:

Following Configuration on Cisco Router R1 will help to fix all the ACL problems.

enable

configure terminal

no ip access-list standard FROM_10

ip access-list standard FROM_10

deny host 10.0.0.2

permit any

exit

!

no ip access-list standard FROM_172

ip access-list standard FROM_172

permit host 172.16.0.2

exit

!

interface GigabitEthernet0/0

ip access-group FROM_192 out

end

write memory

!

7 0
3 years ago
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
3 years ago
Read 2 more answers
Classify each of the cost items (a-h) into one of the business functions of the value chain Cost Item Value Chain Business Funct
rewona [7]

Answer:

Explanation:

a)In this process, the power, electricity, water, etc consumed by the Production department are assembled.

b)In this department, the products are processed and shipped to the retail customers. The costs required for shipping the Latitude line of products comes under the Distribution department.

c)The activities like planning, designing, white box and black box testing are done in the Design process of a product.

d. Salary of computer scientist working on the next generation of servers related to Development.

e. Cost of Dell employees' visit to a major customer to demonstrate Dell?s ability to interconnect with other computers related to Customer Service or Marketing.

f)The cost required for testing the products comes under the Research and development.

g)Marketing department includes the costs of market research, selling the products and other business costs.

h)Purchasing the cartridges from the external suppliers comes under the production department.

7 0
2 years ago
Other questions:
  • Use your own words to describe how IT/IS can support major functional areas in the business. Discuss at least two of these areas
    14·1 answer
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    13·2 answers
  • At what point is an idea protected by copyright?
    7·2 answers
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    8·1 answer
  • Which software is used to play, create, and modify audio and video files?
    7·2 answers
  • "You have a user who needs to keep desktop devices such as keyboard, monitor, and mouse permanently connected so that they can b
    12·1 answer
  • Edhesive coding practice 3.4​
    13·2 answers
  • Conclusion for primary memory
    15·1 answer
  • Examples of application software​
    7·2 answers
  • On a rheostat the first terminal is connected to a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!