1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
3 years ago
10

How do I open a letter doc in my documents in my documents folder?

Computers and Technology
1 answer:
Annette [7]3 years ago
5 0
Double click the letter doc, it s hold open automatically
You might be interested in
You must configure a certificate authority on your network to use EFS. True or False?
Westkost [7]

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

6 0
3 years ago
11. What is the hexadecimal representation of each of the following binary numbers? a. 1100 1111 0101 0111
Marat540 [252]

Answer:

(a) 1100 1111 0101 0111_{2} = CF57_{16}

Explanation:

To convert from binary to hexadecimal, convert each 4 binary digits to its hexadecimal equivalent according to the following;

<em>Binary => Hex</em>

0000  => 0

0001   => 1

0010   => 2

0011    => 3

0100   => 4

0101    => 5

0110    => 6

0111     => 7

1000   => 8

1001    => 9

1010    => A

1011     => B

1100    => C

1101     => D

1110     => E

1111      => F

(a) 1100 1111 0101 0111

=> Taking the first four binary digits : 1100

According to the table, the hexadecimal equivalent is C

=> Taking the second four binary digits : 1111

According to the table, the hexadecimal equivalent is F

=> Taking the third four binary digits : 0101

According to the table, the hexadecimal equivalent is 5

=> Taking the last four binary digits : 0111

According to the table, the hexadecimal equivalent is 7

Therefore, the hexadecimal representation of

1100 1111 0101 0111 is CF57

3 0
3 years ago
Hello can you please help with this if you want to thank you!
nikklg [1K]

Answer:

hardware and software is the answer

8 0
3 years ago
Read 2 more answers
How is a ink pen better than a digital pen.
Hatshy [7]
It depends on what digital pen you're using.
Ink pens are better because they don't run out of ink like digital and you dont have to re-charge every time.
Hope this helps!:)<span />
8 0
4 years ago
How do keygens work?
Artist 52 [7]
What are keygens please

3 0
4 years ago
Other questions:
  • According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
    8·1 answer
  • HELP ME FAST???
    15·1 answer
  • I NEED IT NOWW
    13·2 answers
  • When you reference a cell or range in a different worksheet, the ____ separates the sheet reference from the cell reference.
    10·1 answer
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • ¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
    13·1 answer
  • What is the function of the operating system of a computer?
    14·1 answer
  • Staff in several departments interact with the order processing system and will be affected by any
    9·1 answer
  • How communication skills are different from self management skills
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!