1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
4 years ago
12

to save a revised document as the original name and in the original file location, a user should select _____. save as file new

save open
Computers and Technology
2 answers:
Schach [20]4 years ago
5 0
The answer is just save
Olin [163]4 years ago
5 0

Answer:

is as save

Explanation:

You might be interested in
This organization created web standards to be followed in the creation and contentof a web page​
kumpel [21]

Answer:

The World Wide Web Consortium (W3C) is an international community where member organizations, a full-time staff, invited experts and the public work together to develop Web Standards. Led by Web inventor and Director Tim Berners-Lee and CEO Jeffrey Jaffe, W3C's mission is to lead the Web to its full potential.

<em />

<em>Hope you got it</em>

4 0
3 years ago
When an object reflects all the light which falls on it it's color will be
lara31 [8.8K]
A- White. shows all wavelengths of light.
4 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Linux - Ubuntu 16.4:
babymother [125]

I believe you have to install locate with "sudo apt-get install locate" and type "locate 'filename'"

6 0
3 years ago
Given f(x) = -2x2 + 5x - 1 and g(x) = 3x + 4 determine a simplified
lukranit [14]

Answer:

-6x^4 + 7x^3 + 17x^2 -4x

Explanation:

( f x g )( x )

Substitute

[( -2x^2 + 5x -1 )( 3x + 4 )]( x )

Use the Distributive Property

[-2x^2( 3x) + 5x( 3x) - 1( 3x) -2x^2( 4) + 5x (4) -1 (4)] (x)

Simplify

( -6x^3 + 7x^2 + 17x -4)(x)

Distributive Property

-6x^4 + 7x^3 + 17x^2 -4x

7 0
4 years ago
Other questions:
  • To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS
    5·2 answers
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    7·2 answers
  • Which of the following is the term for software that automatically displays or downloads unwanted offers?
    15·1 answer
  • U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
    6·1 answer
  • Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
    13·1 answer
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I
    8·1 answer
  • Differentiate Between<br>Master file and transaction file<br>​
    15·2 answers
  • Williams Bros. Appliances
    12·1 answer
  • What is the effects of computer and internet attacks​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!