Answer:
Folder
Explanation:
We will create folders in our operating system to store inside our files, documents, music, videos.
Once a folder has been created, other folders can be created inside and within these others, it will depend on our degree of organization or needs at all times.
The folders can be created on the desktop or on a hard drive or pendrive.
PROCESS:
- Click with the right mouse button on the desktop or the area where we want to create the folder.
- Click on the "NEW" option and in the new window that will show us click on the "FOLDER" with the left mouse button.
- We will create the folder with the name "NEW FOLDER" flashing the cursor. At that time we can replace it with the name we want to give it.
ASAP
WHEN YOU WANT TO PASS A LARGE TRUCK IN THE CENTER OF THREE LANES, IT'S BEST TO PASS:
A. Quickly on the left and move ahead of it
B. Very slowly on the left and move ahead of it
C. Very quickly on the right and move ahead of it
A. Quickly on the left and move ahead of it
What is a large truck called?In North America, the combination vehicles made up of a powered semi-tractor and one or more semitrailers are known as "semis", "semitrailers", "tractor-trailers", "big rigs", "semi-trucks", "eighteen-wheelers" or "semi-tractor-trailers".
What is a truck called?Image result for A LARGE TRUCK
truck, also called lorry, any motor vehicle designed to carry freight or goods or to perform special services such as fire fighting. The truck was derived from horse-driven wagon technology, and some of the pioneer manufacturers came from the wagon business
To learn more about LARGE TRUCK, refer
https://brainly.com/question/1992861
#SPJ2
Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who is using the correct disk for its purpose?
A. Only Carlo is correct. B. Neither Carlo nor Liz is correct. C. Both Carlo and Liz are correct. D. Only Liz is correct.
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
"the most common way to access the internet is through ________."
A user reports that his macine will no longer boot properly. after asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware has infected the system
A malware is a software the capable to damage or disable computer programs. The user must reimage the machine or reprogram the system. It can be also boot from Windows installation and use the recovery environment to run a startup repair.
Which version of windows server 2008 must computer be running to create a failover cluster?
In order to use the commit command in oracle, you need to clear the check mark from the ____ check box.
Inkjet printers and laser printers are examples of ________ printers.
To access an array element, use the array name and the element's ______.
For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can accomplish this task?
Final answer:
To prevent local computers from pinging each other, a network administrator can adjust the firewall settings to block ICMP Echo Requests, either on individual computers or network devices.
Explanation:
To prevent local computers from pinging each other on a network, a network administrator can configure the firewall settings on each computer. By setting up inbound and outbound rules, they can block Internet Control Message Protocol (ICMP) requests, which are used by the ping command. Specifically, the administrator would need to block ICMP Echo Requests to stop computers from responding to pings. Depending on the network's complexity, this can be done either individually on each computer, through a group policy in a Windows domain environment, or on a central network device like a router or firewall that governs the local network traffic. By implementing these firewall settings, local computers will not be able to ping each other, thus enhancing security on the network.
When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the asterisk character (*)?
If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level
The technology (software) that automatically downloads website information to your computer is called ________.'
What computer system was the first to run the unix operating system?
Give one advantage and two disadvantages of using a wireless network
What to do when the tool bar for paint tool sai dissapears?
Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
A database application is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. Thus option B is correct.
What is Reports?
A report refers to any document or statement which provides information about any particular subject, or issues to the reader about any particular situation based on facts and supporting evidence.
Computer software known as a database application has as its main function the extraction of information from a digital database. As they offer a practical means of managing big volumes and various kinds of data, it is crucial for organizations.
It makes it simple to show how activities in one area of the company affect other areas, implementing a database management system will help you create a more detailed picture of your operations.
Therefore, option B is appropriate.
Learn more about Reports, here:
https://brainly.com/question/14969693
#SPJ6
The complete question is Probably
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
A) metadata table
B) database application
C) database hierarchy
D) dimension table
Which actions can be performed on tables in Word? Check all that apply.
adding rows
adding columns
deleting rows
deleting columns
changing column width
aligning tables
converting tables to text
converting tables to graphs
All the actions from the above will be added and are considered as actions that can be performed on tables in Word.
What are tables in Word?There are rows plus columns in a table. A compartment is a point where a row, as well as a column, meet. Tables have many more functions in addition to being frequently used to arrange facts and figures. It helps in making the data in a sorted order which means that the data will be according to the table.
adding rows feature is included in Wordadding columns feature is included in Worddeleting rows feature is included in Worddeleting columns feature is included in Wordchanging column width feature is included in Wordaligning tables feature is included in Wordconverting tables to text feature is included in Wordconverting tables to graphs feature is included in WordLearn more about tables in Word, here:
https://brainly.com/question/26344744
#SPJ2
You are boating on a lake. the weather turns bad. what should all passengers do first?
Answer:
Wear your life jackets
Explanation:
If you foresee bad weather, the best thing to do is to slow the boat down. Close all doors and windows. Stow all unnecessary equipment.
However, once inside the bad weather. The best thing to do is to wear your life jacket and make sure it is equipped properly. For any reason, you may fall overboard, the life jacket will help you stay afloat. Life jackets typically come equipped with lights and whistles. This would be vital for you to find fellow passengers. And vice versa, of course.
While boating on a lake and the weather suddenly turns bad, quickly advice all passengers to put on their life-jacket.
What is a life-jacket?A life-jacket is a type of life saving jacket just as the name implies. It is used to suspend the individual that is wearing it on the surface of deep waters.
While traveling by a boat or carrying out a leisurely activity using a boat the following precautions needs to be taken:
Always put on the life-jacket while boating.Always check the life-jackets to ensure its in good condition before boatingAlways check for updates concerning the weather forecast to avoid boating in bad weather.Therefore, while boating on a lake and the weather suddenly turns bad, quickly advise all passengers to put on their life-jacket.
Learn more about life-jackets here:
https://brainly.com/question/13447405
Voip uses ________ technology similar to email to transmit voice over the internet. digital
The answer to this question is Digital technology.
Digital technology refers to the software and hardware that are used in our homes, schools, and offices which are evolving. Digital technologies are electronic tools like online games, social media, and mobile devices. Digital technology comprises of electronics like fast computers, portable devices, and networks with higher connections.
You can select a noncontiguous range of cells by pressing and holding the ________ key when using it in combination with other navigation keys and/or the mouse
Horizontal scaling of client/server architecture means _____.
What kind of device is a cpu input or output?
What is the name of the interface that uses graphics as compared to a command-driven interface?
Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmitting classified information up to top secret.
SecNet 11 Plus is a family of encrypted 802.11b wi-fi networking products. The Army has also approved SecNet 11 as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.
A __________ is a collection of modems and other equipment in a local area that acts as an isp's gateway to the internet.
A virtual meeting is the same thing as a/an A. online meeting. B. VoIP. C. seminar. D. convention.
Answer:
a developer forum
Explanation:
Little circles located in front of various website screen options, which can be selected with the mouse, are called ________.
In which osi model layer does tcp operate?