1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
8

The ______ identifies the path for the currently open folder

Computers and Technology
2 answers:
skelet666 [1.2K]3 years ago
8 0

The answer to this question is called Directory Paths. Directory Paths because most of the time they include one or more paths to the folder.

alexdok [17]3 years ago
4 0

Directory path. The <u>directory path</u> idntifies the path for the current open folder.

Hope it helps;Pls mark as brainliest

You might be interested in
Write a set of nested loops that display 10 rows of # characters. There should be 15 # characters in each row.
Andrews [41]

Answer:

Following are the code to this question:

public class M//defining class M

{

public static void main(String[] as)//defining main method

{

    int i,j;//defining integer variable

for (i= 1; i <=10; i++)//defining for loop for print column    

{

for (j = 1; j<=15; j++)//defining for loop for print rows

{

System.out.print("#");//print # value

}

System.out.println();//print space

}

}

}

Output:

###############

###############

###############

###############

###############

###############

###############

###############

###############

###############

Explanation:

The code defines a class "M" and the main method is defined within a class and two integer variables I and j" are defined within the primary procedure, while the next step defines two for a loop.  

In the first loop, the column value is printed, and a further loop that prints the row value is declared inside the loop.  

5 0
3 years ago
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
3 years ago
A computer which links several pcs together in a network is called
Nadusha1986 [10]
Is it called a, "server".
8 0
4 years ago
____ is one of the primary operations of a computer.
Romashka [77]
Processing <span>is one of the primary operations of a computer.</span>
7 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • HELP ASAP????? please
    5·2 answers
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • A variable must have its type declared but it is not required to be initialized prior to first use.
    12·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.
    7·1 answer
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • A foreign exchange student brought his desktop computer from his home in Europe to the United States. He brought a power adapter
    9·1 answer
  • A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, Able, Baker, C
    11·1 answer
  • How to test someone elese internet speed from a distance
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!