Placing a(n)____ to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

Answers

Answer 1

Placing shortcut  to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

What are shortcuts on the desktop?

The shortcuts on the desktop serves as the tolls that help in the location of files as well as other documents and function on the desktop which help in time management when working on the computer.

It should be noted that Placing shortcut  to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

Learn more about desktop on:

https://brainly.com/question/24735155

#SPJ1


Related Questions

An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in the enterprise's own cloud establishment. Which type of cloud is used by the enterprise

Answers

An enterprise's application server and web server that are hosted by a cloud service provider will use option b: Hybrid cloud as the type of cloud is used by the enterprise.

What is hybrid cloud and how does it work?

Hybrid cloud is known to be a very common  IT infrastructure that is made to help to link up at least one public cloud and also that of a one private cloud.

This is known to be one that helps to give orchestration, management and also the function of application portability that exist between them to make a single, cloud environment for the running of a firms' computing workloads.

Hence, based on the above, An enterprise's application server and web server that are hosted by a cloud service provider will use option b: Hybrid cloud as the type of cloud is used by the enterprise.

Learn more about hybrid cloud from

https://brainly.com/question/27838623

#SPJ1

See full question below

An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in their cloud establishment. Which type of cloud is used by the enterprise?

Private cloud

Hybrid cloud

Community cloud

Public cloud

A(n) ________ engine is a specialized program that assists you in locating information on the web and the internet. group of answer choices micro search wiki cloud

Answers

A Search engine is a specialized program that assists you in locating information on the web and the internet.

What is a Search engine?

This is known to be a kind of a Software type.

A search engine is  also seen to be a type of a software system that is known to be designed to function or work out web searches.

Note that They tend to  search the World Wide Web in a way that is systematic in nature  for specific information that is said to be specified in a textual web search query.

Therefore, based on the definition given, one can say that A Search engine is a specialized program that assists you in locating information on the web and the internet.

Learn more about Search engine from

https://brainly.com/question/512733

#SPJ1

All information that is to be processed by a computer must first be entered into memory via an input device.

a. true
b. false

Answers

The answer is true, since it needs to be sent to the main server to be processed

Hardware refers to the _________________ of a computer

Answers

Answer:

physical component

Explanation:

Well, softwares are the applications and anything installed inside the computer but hardware isn't installed, it's just been connected by wires

Cloudy computing would like to be able to link related cases together. As the admin, what would you recommend?

Answers

As the admin of a cloud computing service, I would you recommend that you ensure the use of pooled resources and efficient client-time management.

What is cloud computing?

Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.

The types of cloud computing.

In Computer technology, there are three main types of cloud computing and these include the following:

Private cloudPublic cloudHybrid cloud

Basically, a hybrid cloud is designed and developed to combine the features of both a private cloud and public cloud. For instance, a hybrid cloud can be used by both the college's IT administrator and its IT consultant company which has access to the learning management system (LMS) application hosted in the cloud.

Read more on cloud computing here: brainly.com/question/17247526

#SPJ1

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service

Answers

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. Software as a service tier of cloud computing best describes Helen's service

This is further explained below.

What is Software?

Generally, The term "software" refers to a collection of instructions, data, or programs that are used to control computers and carry out certain activities. In contrast to hardware, which refers to the tangible components of a computer, this refers to the software that runs on the device. The phrase "software" refers to apps, scripts, and programs that may be executed on a device. Software is a general term.

In conclusion, Helen is now providing her clients with a newly developed payroll system that she devised herself. Her clients log in to the AWS-hosted payroll system using the web interface that she provides for them. The layer of cloud computing known as software as a service is the one that most accurately reflects Helen's service.

Read more about Software

https://brainly.com/question/1022352

#SPJ1

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

Answers

The term that is used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity is End-of-life.

What is an Operating System?

This refers to the interface that is used to connect the application and system software in a computer and enables it to function.

Hence, we can see that when a particular operating system will no longer be supported by its manufacturer or managing entity, this is known as End-of-life.

Read more about operating systems here:

https://brainly.com/question/1763761

#SPJ1

If the columns to be matched in a join have the same name, you can use the _________ clause followed by the column name.

Answers

If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.

What is a clause?

A clause is known to be a set or group of words that  is said to be made up of a verb which is known to usually have other components.

Note that A clause can be made to form part of a sentence or it is said to be able to a complete sentence itself.

The period of agreement is seen as the contract period that is the  number of days that exist between a given start date and its end.

Hence, based on the above, in regards to java,  If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.

Learn more about  Clause from

https://brainly.com/question/541212

#SPJ1

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router

Answers

In this scenario, the next step that you should perform on your router is: D. verify the LAN interface status.

What is a router?

A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

What is IP address?

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In this scenario, the next step that you should perform on your router is verifying the status of the local area network (LAN) interface.

Read more on router here: brainly.com/question/24812743

#SPJ1

Complete Question:

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?

Verify the WAN interface status

Check the ARP cache

Check the IP routing table

Verify the LAN interface status

Check the MAC address table

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs

Answers

The cloud access security broker (CASB) approach which is most appropriate for Brian's needs is: D. API-based CASB.

What is an API?

API is an acronym for application programming interface and it's a software intermediary (computing interface) that is made up of tools, set of executable codes, and protocols that help software applications and computers to function properly, as well enable the exchange of data.

In Computer technology, an application programming interface (API) is designed and developed to allow a network device and a server or two servers to share data and functionality within the cloud. Also, a software developer integrates an application programming interface (API) into the software.

In this context, we can infer and logically deduce that the cloud access security broker (CASB) approach which is most appropriate for Brian's needs is an API-based CASB.

Read more on API here: https://brainly.com/question/20910074

#SPJ1

Complete Question:

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?

A. Inline CASB

B. Outsider CASB

C. Comprehensive CASB

D. API-based CASB

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute force attack?

Answers

Explanation:

A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.

We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.

Instruction messages clearly explain how to execute a task. Before writing instructions, be sure you fully understand the process you are explaining. The body of instruction messages should

Answers

Instruction messages is one where the body of instruction messages should arrange items vertically with numbers.

What is an  Instruction messages?

An instructional message is known to be one whose design is said to be a kind of a  real-world application of instructional and learning theories that is made to design the tools and technologies that are also known to be used to communicate and rightly pass information

Note that based on the above,  Instruction messages is one where the body of instruction messages should arrange items vertically with numbers.

See full question below

Instruction messages clearly explain how to execute a task. Before writing instructions, be sure you fully understand the process you are explaining.

The body of instruction messages should : ___________?

A. divide the instructions into steps

B. avoid numerical lists

C. arrange items horizontally

Learn more about Instruction messages from

https://brainly.com/question/13669320

#SPJ1

If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with:

Answers

If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.

Why is byte alignment important?

It is known to be vital because the CPU  is said to always reads the word size often (4 bytes on a 32-bit processor).

Therefore, if a person do an unaligned address access using a processor that aids it, the processor will be able to read a lot of words.

Note that the CPU is said to read each word of memory that is said to be requested of the address straddles and as such, If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.

Learn more about bits  from

https://brainly.com/question/19667078

#SPJ1

Generic mouse and keyboard drivers are included with the os.
a. true
b. false

Answers

Answer:

This is true!

Explanation:

Mouse and keyboard drivers are standard and are usually included with the OS.

The hardware component of a computer system consists of programs written in computer languages. a. True b. False

Answers

Answer: true

Explanation:

according to the most typical basic paradigm of programming theory, a computer program is an algorithm written in a programming language, a series of instructions satisfying certain exact conditions and requirements (predefinedness, clear execution, etc.)

Column text that is aligned to both the left and right margins is referred to as?

Answers

Answer:

The column text that is aligned to both the left and right is called Justify

Explanation:

When your are in a text editor the aligning of a text can be determinate for four options:

Left alignRight align Center alignJustify align

Justify text is align in both cases (you can proof this with a text editor and testing the differents types of alignements).

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building

Answers

A wireless network topology which would be used by network engineers to design and provide a wireless network service for an entire college building is an: C. infrastructure.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

What is a topology?

A topology can be defined as the graphical representation of the various networking devices that are used to create and manage a network connection.

In Computer Networking, we can infer and logically deduce that an infrastructure is a wireless network topology which should be used by network engineers to design and provide a wireless network service for an entire college building.

Read more on topology here: https://brainly.com/question/17036446

#SPJ1

Complete Question:

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

ad hoc

hotspot

infrastructure

mixed mode

What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?

Answers

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

https://brainly.com/question/18696862

#SPJ1

Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applications.

Answers

Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications.

What is silicone rubber made from?

Silicone rubber is known to be a kind of an elastomer that is said to be made up of silicone that has silicon along with carbon, hydrogen, and oxygen.

Note that  Silicone is said to be a form of an inorganic substance, while polyurethane is said to be organic in nature.

The use of thus Silicone rubber and urethane is therefore very essential to building construction.

Hence, based on the above, Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications and this is a true statement.

Learn more about Silicone rubber from

https://brainly.com/question/18902047

#SPJ1

Product with recursive methods using recursion, create a program that will allow for a user to enter 5 numbers. The program will provide the product of all 5 numbers using recursive methods. Submit screenshots of your program?s execution and output. Include all appropriate source code in a zip file. Java.

Answers

Given a product with recursive methods using recursion, the program that will allow for a user to enter 5 numbers is given below.

What program will allow for a user to enter 5 numbers is given below?

import java.util.Scanner;

class Main

{

public static void main(String[] args)

{

int[] arrray = new int[5]; // variable declaration

Scanner s = new Scanner(System.in); // scanner declaration

System.out.print("Enter five numbers:");

for(int i=0;i<5;i++)  // Loop runs from 0 to 4 total 5 times

arrray[i] = s.nextInt();   // Accept array elements

System.out.println("Multiplication of 5 numbers is "+multiply(arrray,4));  // calling function

}

public static int multiply(int x[], int count)  // Called function

{

if(count<0)

return 1;  // It return 1

return x[count] * multiply(x, --count);  // recursive calling

}

}

Learn more about programs:
https://brainly.com/question/26134656
#SPJ1

A technician is troubleshooting a slow wlan and decides to use the split-the-traffic approach. which two parameters would have to be configured to do this?

Answers

Answer:

Configure the 5 GHz band for streaming multimedia and time sensitive traffic & Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

In Binary language 10 stands for two. So this means that there are 2 types of people, one who understand binary and others who don't.

The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the:________

Answers

The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.

What is operational stress continuum model?

The combat operational stress continuum was designed by the United States Navy and Marine Corps as indicator for injury.

It has different color depending  on the severity of injurie and it is used to measure how much of deployment-related stress.

The color ranges from green which is ready to yellow which means reacting and orange which means injured.

Therefore, the combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.

Lear more on leader below

https://brainly.com/question/12522775

#SPJ1

When a device renews its dhcp lease, which two steps in the dhcp process are skipped?

Answers

When a device renews its DHCP lease, the two steps in the DHCP process that are skipped are discover and offer. The correct options are a and e.

What is the DHCP lease?

DHCP is an IP address provisionally assigned to a networked device. Each client connected to the network while an IP address pool is managed using DHCP is merely “renting” an IP address.

As a result, DHCP servers only handle IP addresses that are valid for a specific amount of time. So in this discovery of DHCP and offers are skipped because they are not important.

Thus, the correct options are a and e.

To learn more about DHCP lease, refer to the below link:

https://brainly.com/question/14696764

#SPJ1

Your question is incomplete. Your most probably complete question is given below:

a discover

b renew

c request

d ACK

e offer

Trevor knows that he must be organized if he wants to develop good software. he decides to use __________ to create a budget, manage workloads, and plan the overall development of new software.

Answers

Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.

What MS Project function as?

Microsoft Project is  known to be a kind of a project management software that is known to be often used to make schedules, project plans and also to handle resources and to know about time.

It has features is made up of Gantt charts, kanban boards, project calendars and others.

Note that Trevor wants to use Microsoft Project, which is said to be a project management tool that aid him as well as other users to plan, create, control, and handle a project's budget and resource.

Therefore, Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.

Learn more about MS project  from

https://brainly.com/question/2704239

#SPJ1

What does a router do with a packet that it does not have a destination network for?

Answers

A router that does not have a destination network for a packet would do the following: B.) Drops the packet.

What is a router?

A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

What is IP address?

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, it is a standard occurrence or phenomenon for a router to drop the packet it receives when it does not have a destination network for the packet.

Read more on router here: brainly.com/question/24812743

#SPJ1

Complete Question:

What does a router do with a packet that it does not have a destination network for?

A.) Sends it to the Serial port

B.) Drops the packet

C.) Sends it back out the same interface it received it in

D.) Forwards the packet to the next hop

Participating in pi planning enables teams to gain alignment and commitment around a clear set of what?

Answers

Participating in pi planning enables teams to gain alignment and commitment around a clear set of prioritized objectives.

What is planning?

Planning is a form of management function,  that involves thinking regarding the activities or project to be done in other to decide beforehand on things to do.

It also involves how the task or assignment is carried out to get  a specified result.

Human resource to be used, materials and possible time frame are involved in planning. It is on of the major objectives in effective business or project management.

Therefore,

Participating in pi planning enables teams to gain alignment and commitment around a clear set of prioritized objectives.

Learn more on Planning below

https://brainly.com/question/25453419

#SPJ1

What tool allows you to discover, cleanse, and transform data with built-in operations?

Answers

Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.

What is meant by data cleaning?

Data cleaning is known to be the act putting together or the fixing/removing any data that is found to be incorrect, corrupted, or one that is incorrectly formatted, copied , or incomplete data that is seen inside a dataset.

Note that in combining multiple data sources, there are a lot of room for for data to be copied or mislabeled.

Watson Studio Refinery, which is known to be obtained via IBM Watson Studio is said to be a tool that  allows a person to discover, cleanse, and transform data using built-in operations.

Therefore, Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.

Learn more about data cleaning from

https://brainly.com/question/13085801

#SPJ1

If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab?

Answers

If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab, ne need to Select the word.

What does it mean to format something in MS word?

Formatting text in regards to Microsoft Word is known to be a term that is seen as the act of controlling how a given  text appears in a document.

Note that in this, its  includes the size, color, and font and thus, one need to select the word before anything or any changes can be made or can be done to it.

Hence, based on the above, If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab, ne need to Select the word.

Learn more about format from

https://brainly.com/question/766378

#SPJ1

Other Questions
When managers base decisions on what has worked in the past and fail to explore new options, they are? Determine if the following statement is true or false and why. Primary and Secondary Consumers lose about 30% of the energy they absorb from food as heat. A. True B. False, it should read Primary Consumers lose about 5% of the energy they absorb from food as heat, while Secondary Consumers lose 30% as heat. C. False, it should read Only Secondary Consumers lose about 30% of the energy they absorb from food as heat. D. False, it should read Primary and Secondary Consumers lose about 5% of the energy they absorb from food as heat. What are the nine basic ways to begin a sentence? What was the significance of mao zedongs slogan "let a hundred flowers bloom, and a hundred schools of thought contend"? Find the surface area of the composite figure.8 cm6 cm7 cm8 cmSA =6 cm[?] cm9 cm6 cm What were the three largest countries under german occupation by 1940? france poland belgium norway czechoslovakia School systems have widely differing practices regarding the education of students with special gifts and talents because? where should i place the points!! help please 25 Points + BRANIEST. PLEASE HELP Nelly works part-time in a shop tocover her university expenses.The table below shows how manyhours she worked each day last week.Hours workedDayMondayTuesdayWednesdayThursdayFridaySaturday352425Nelly's weekly pay is worked outas follows: Monday to Friday 8 per hour for the first 15 hours 10 per hour for any extra hoursSaturday. double the normal rate of 8 per hourWork out Nelly's total pay for last week?You must show all your working. Humood's house is (-5,7)The school is (3,1)If each unit in the graph is 50m, find the distance from Humood's house to the school. Use the Divergence Theorem to evaluate the surface integral Solve for b in the following equation. x/6 - 2 = 4 b = 24 b = 12 b = 1 b = 36 What are the relevant facts and specific law that support maalick's contention that he was not promoted due to religious discrimination? be specific Treatment of a puncture wound includes Group of answer choices approximation of the wound edges for suturing. copious irrigation of the wound. All of the answer options brisk scrubbing of the area with a brush. Arh2050 what decorative feature is found on the frieze of a doric order style temple? The role of the Product Owner is most closely aligned with which Agile Manifesto principle? Continuous attention to technical excellence and good design enhances agility Aakash has a fever. His body temperature during the day was 99.2F. By evening, his body temperature has increased by 3.4F.His body temperature in the evening is F. The first step in dna isolation is called ________. it refers to the process of releasing dna from the cells. When searching for the value 10 in the array [2, 3, 5, 6, 9, 13, 16, 19], a recursive binary search algorithm will return what?