1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
15

How to Create a text file called my cybersecurity?

Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
7 0
On windows go to your file explorer right click on an empty space then click new text file. Type what you want on the text file then click at the top left of that window “file” then “save as” then in the typing bar at the bottom of the new window rename whatever was there to “cyber security” then change where you want to place that file and click enter
You might be interested in
What is the output after running the following code snippet? int number = 600; if (number < 200) { System.out.println("Low sp
Nutka1998 [239]

Answer:

Above average!

Explanation:

The code snippet is testing different values of the integer variable number.

If number is less than 200 It prints Low Spender

else If number is more than 200 but less than 500 It prints Spending in moderation

else if number is more than 500 but less than 100 It prints Above Average!

In the code snippet given, number is set to 600 So it prints Above Average!

8 0
3 years ago
Mark is flying to Atlanta. The flight is completely full with 200 passengers. Mark notices he dropped his ticket while grabbing
Greeley [361]

Answer:

The list that would be helpful in this situation would be a list of people in the airport

Hope This Helps!!!

8 0
3 years ago
Which website allows you to host your podcast for at a cost that includes your domain name?
scZoUnD [109]

Answer: WordPress

Explanation:It is a kind of website where you can publish your content on any thing and can also buy domain there,if wanted

8 0
3 years ago
Read 2 more answers
A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
Gekata [30.6K]
Variable

----------------------------------
6 0
4 years ago
Disconnecting or making the equipment safe involves the removal of all energy sources and is known as _____________. A) Isolatio
Ray Of Light [21]

Isolation. Also is known as Lockout-Tagout. I hope this helps.

5 0
3 years ago
Read 2 more answers
Other questions:
  • ________ is a software that interprets java bytecode.
    12·1 answer
  • How can you clean out the scales in an electric iron without taking the iron apart? A. By rinsing the tank and holes with a wate
    12·2 answers
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • Explain the third <br> generation
    6·1 answer
  • A serialized object is ________. an object represented as a sequence of bytes used to store the object's data in a file an objec
    5·2 answers
  • Write a function named firstLast2 that takes as input an array of integers and an integer that specifies how many entries are in
    14·1 answer
  • The first commercially available digital camera was which of the following?
    9·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • What is the main difference between the ICD-10 annual revision released by the WHO and the ICD-10-CM/PCS annual revision release
    11·1 answer
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!