1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
9

How do you copy a file​

Computers and Technology
1 answer:
trasher [3.6K]3 years ago
8 0

Answer:

right click and press control c

You might be interested in
___________ key encryption in wep uses the rc4 encryption algorithm.
lora16 [44]

Shared key encryption in wep uses the rc4 encryption algorithm.

7 0
3 years ago
Edhesive silly questionsj
Alex17521 [72]
Mnhhbjhhhhdndkdjdjddnnxnx
4 0
3 years ago
-Define three types of user mode to kernel mode transfers?
Ivahew [28]

Answer:

 The three types of user mode to the kernel mode transferred occurred due to the:

  • It is mainly occurred due to the interrupt when, it send to the central processing unit (CPU).
  • It also occurs due to the hardware exception and when the memory is access illegally as it is divided by the zero.
  • It is mainly implemented or executed by the trap instruction as the system are basically executed by the program.
7 0
3 years ago
A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
Nonamiya [84]

Answer:

The correct option is option 3 which is The code segment works as intended but only when the sum of the three lengths is an integer or the decimal part of the sum of the three lengths is greater than or equal to 0.5.

Explanation:

As the variable minLength is defined as an integer thus the value is being truncated although the value of 0.5 is being added however if the decimal portion of the length is less than 0.5, the portion is truncated.

7 0
3 years ago
Read 2 more answers
Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t
natali 33 [55]

Answer:

Select the function of keypunches that were used as one of the earliest input devices.(1 point) -It was used for punching holes in the paper at relevant ...

Explanation:

3 0
2 years ago
Other questions:
  • Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb
    7·2 answers
  • What action makes RAM on your computer disappear?
    12·2 answers
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • Technologies designed to replace operating systems and services when they fail are called what?
    15·1 answer
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • A photographer uses which of these tools to form an argument?
    14·2 answers
  • Write a static method named contains that accepts two arrays of integers a1 and a2 as
    14·1 answer
  • Which of the following is an example of a long-term goal?Developing a lifetime savings plan
    11·1 answer
  • Please Answer ASAP!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!