1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
15

How to Create a text file called my cybersecurity?

Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
7 0
On windows go to your file explorer right click on an empty space then click new text file. Type what you want on the text file then click at the top left of that window “file” then “save as” then in the typing bar at the bottom of the new window rename whatever was there to “cyber security” then change where you want to place that file and click enter
You might be interested in
How to convert a .enw file into a .pdf without downloading any applications? (If I have to, then I will. Just please tell me.)
kolezko [41]

Answer: use this link :- https://www.file-extension.info/conversion/enw-to-pdf

Explanation:

7 0
3 years ago
Read 2 more answers
A normal HDMI signal has a colour depth of 8 bits per each of RGB colour. The maximum number
Marysya12 [62]

Answer: B

Explanation:

if each color can be represented as 8 bits and you have 3 colors total that would mean you would need 24 bits to represent the entirety of the RGB spectrum. And each bit can either be on or off so you have two choices for each one. So the total amount of colors you can have for 8bit RGB would be 2^{24} which is 16,777,216.

6 0
3 years ago
Complete each sentence to describe different elements of an Excel worksheet.
barxatty [35]

Answer:

Answer is - cell, - column, - string value

Explanation:

  • <em>Cell - this is often referred to as the intersection of a single row and column.  </em>
  • <em>Column - this is a group of cells which are represented vertically.  </em>
  • <em>String - these are values that are inside the cell which are represented through texts or group of letters including acceptable symbols and characters.</em>
7 0
3 years ago
Read 2 more answers
Which processor interrupts the system 18.2 times per second? What are some of its practical uses?
julsineya [31]

Answer:

timer interrupt

Explanation:

A timer is an interrupt that is generated by the PC's system timer.When this interrupt occurs, the ROM BIOS interrupt handler is called and it increments a count in the ROM BIOS.It interrupts the system 18.2 times per second.It is used for multitasking.Hence we conclude that timer interrupt is the answer.

6 0
3 years ago
The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
mote1985 [20]

The program is correct: at the beginning, product = 0. Then, we start summing Y to that variable, and we sum Y exactly X times, because with each iteration we increase Count by 1, and check if Count=X so that we can exit the loop.

5 0
3 years ago
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • Assure that major, minor, sub1 and sub2 each contain four digit numbersIf less than four digits are entered in major OR minor OR
    5·1 answer
  • There are about what licensed drivers here in Florida
    7·1 answer
  • Through the use of a _____ system, information on prospective, current, and past customers is stored and analyzed for future pla
    15·1 answer
  • Write a program with total change amount as an integer input, and output the change using the fewest coins, one coin type per li
    11·1 answer
  • Write the definitions for three functions named max. Each receives two parameters, of the same type, and returns the larger of t
    14·1 answer
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • Could someone please explain to me the an electrical circuit.
    13·2 answers
  • Mention two strategies of collecting data​
    13·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!