You saved a file on drive C go your computer. You want to find and open the file. Which of the following programs will you use to find the saved file?

Answers

Answer 1

Group of answer choices.

A. Spreadsheet program

B. Microsoft Windows Explorer

C. Word-processing program

D. Notepad

Answer:

B. Microsoft Windows Explorer

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

In this scenario, you saved a file on drive "C" of your computer. The software program or application which you would use to find and open the file is Microsoft Windows Explorer.

The Microsoft Windows Explorer is an inbuilt resources that avails the end users the ability to perform various operations on a file and it provides the folder paths used for the storage of user files. It is the default program for file and folder documents on a computer system.


Related Questions

Describe how to create a new folder on the desktop​

Answers

Justt create a new folder!

Which of the following statements represents the pros and cons of Internet regulations?

Answers

Answer:

Internet regulations increase net security but lead to monopolizing of services.

Explanation:

Internet regulations can be defined as standard rules or laws that restricts or control the use of the internet, as well as stating the acceptable usage of the internet in a particular location.

The pros and cons of Internet regulations is that, Internet regulations increase net security through the use of encryption and authentication proceses but lead to monopolizing of services.

A monopoly is a market structure which is typically characterized by a single-seller who sells a unique product in the market by dominance. This ultimately implies that, it is a market structure wherein the seller has no competitor because he is solely responsible for the sale of unique products without close substitutes. Any individual that deals with the sales of unique products in a monopolistic market is generally referred to as a monopolist.

For example, a public power company is an example of a monopoly because they serve as the only source of power utility provider to the general public in a society.

Answer:

Regulatory practices provide more security for the consumer but may create monopolies in the industry, reducing consumer choice.

Explanation:

edg2021

Internet regulations increase net security but could lead to monopolizing of services.  Properly done, Internet regulations benefit industry, government, and consumers by providing more online security, regulating prices for services, and decreasing liability. However, some regulations could also lead to unfair service practices, slow technological advances, and possibly contribute to technology monopolies.

Falling If the user doesn't do anything, the player sprite should fall. Do This • Find the code comment // FALLING . • Use the counter pattern with the player sprite's velocityy to make the flyer fall. Test your code to make sure that it works. The sprite should fall faster as it goes down the . screen. Toolbox ♡ Workspace World Sprites 1 77 GAME SETUP Drawing Control 2 // create player, target, and obstacles Math Variables 3 var rock = createSprite(109 100) var sprite = createSpritex, 4 rock.scale = 0.5; sprite.setAnimation (label) 5 var player createSprite(200, 100) 1: player.setAnimation "fly_bot"); sprite.x 6​

Answers

sdcyecreat nobody cares because nobody asked nobody likes you I’m just kidding I love you so much have a great day

How do you calculate the slope for a voltage-current graph?

Answers

Answer:

Choose two points on the line to work from (point C and point D).

Calculate the voltage difference between the two points (the RISE of the slope).

Calculate the current gap between the two points (the RUN of the slope).

Subtract the RISE from the RUN. This is the line's slope.

Explanation:

What is the status of this account?
A)Current
B)Current, but closed
C)Potentially negative
D)Potentially negative, but closed

Answers

It’s sort of confusing to Answer if you don’t have a picture reference to describe this question

pls answer the question

Answers

the arrow is the connector wit arrow and terminal box is the square one i dare arrow that’s all i know !

Answer:

hi

Explanation:

3. Choose the statement that best describes a ray. A ray extends forever in both directions. B ray is a part of a line with two endpoints. C ray is an exact location. D ray has one endpoint and continues forever in the opposite direction.

Answers

Answer:

Ray is part of a line that starts at one point and extends forever in one direction.

Explanation:

In geometry, a ray can be defined as a part of a line that has a fixed starting point but no end-point. It can extend infinitely in one direction. On its way to infinity, a ray may pass through more than one point. The vertex of the angles is the starting point of the rays.

Extra

B. A part of a line with two endpoints?

line segment

A line segment has two endpoints. It contains these endpoints and all the points of the line between them. You can measure the length of a segment, but not of a line. A segment is named by its two endpoints, for example, ¯AB.

Answer:

Ray is part of a line that starts at one point and extends forever in one direction.

Explanation:

Use which command when you apply formatting to text and then want to apply the same formatting to other text in the document.​

Answers

Answer:

Use the Format Painter on the Home tab to quickly apply the same formatting, such as color, font style and size, and border style, to multiple pieces of text or graphics.

Give five examples of physical networking.

Answers

Answer:

Local area network (LAN), Wide area network (WAN), Metropolitan area network (MAN), Personal area network (PAN), Others

Explanation:

Others can be classified as peer to peer, bluetooth

Match each role to the corresponding web development task.

Answers

Answer:

1. Art director: selecting color palettes.

2. Web project manager: creating budget spreadsheets.

3. Usability lead: researching target audiences.

4. Developer: coding.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The various role performed during the web development process (task) includes;

1. Art director: selecting color palettes. This individual is saddled with the responsibility of choosing the color that best fits a website.

2. Web project manager: creating budget spreadsheets. He or she is responsible for performing tasks such as creating a financial (budget) plan, start and finish date (timing), procurement, etc.

3. Usability lead: researching target audiences. This individual is saddled with the responsibility of surveying and collecting data from the demography for which the website is designed.

4. Developer: coding. This is the technical expert referred to as a web developer and is responsible for writing the set of instructions (codes) that enables the website to work properly and serve a purpose.

HELP PLEASE!
I dowloaded this app and it gave me a virus. DOES ANYONE HAVE ANY IDEA HOW TO DELETE IT? I have an apple laptop and I don't know how. My laptop send me a message telling me a have a virus and this laptop has MANY IMPORTANT FILES. PLEASE HELP ASAP. I'LL GIVE BRAINLIEST. DONT GIVE LINKS OR LEAVE IT BLANK.

Answers

Answer:

It probably is fake. Send me a screenshot. Also, just saying if it asks you to download a app of something, dont do it its just a scam to make you panic.

Explanation:

A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session.
Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList, which will contain the names of children attending both sessions.
The following code segment is intended to create lunchList, which is initially empty.

It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise.



FOR EACH child IN morningList

{



}

Which of the following could replace so that the code segment works as intended?
(A)
IF (IsFound (afternoonList, child))

{

APPEND (lunchList, child)

}

(B)
IF (IsFound (lunchList, child))

{

APPEND (afternoonList, child)

}
(C)
IF (IsFound (morningList, child))

{

APPEND (lunchList, child)

}

(D)
IF ((IsFound (morningList, child)) OR

(IsFound (afternoonList, child)))

{

APPEND (lunchList, child)

}

Answers

Answer:

The answer is "Option A".

Explanation:

In this question, the choice "A" is correct because in this a conditional if block statement is used that that use "IsFound" method that takes two parameters "afternoonList and Child" in its parameter and use the append method that takes "lunchList and child" in parameter and add values, that's why other choices are wrong.

Which of the following statements about version control are true? Select 3 options.

Early version control systems needed to use locks to keep files synchronized, but newer version control systems do not use locks at all.

With distributed version control, multiple copies of the entire project are maintained on the developers’ computers.

Version control systems can only be used by teams of developers, rather than individuals.

Git and Mercurial are examples of distributed version control systems.

In a centralized version control system, the project files are stored in a repository or database on a server

Answers

Answer:

In a centralized version control system, the project files are stored in a repository or database on a server

Git and Mercurial are examples of distributed version control systems.

With distributed version control, multiple copies of the entire project are maintained on the developers’ computers.

Explanation:

Your Welcome!

The statements about version control that are true include the following:

B. With distributed version control, multiple copies of the entire project are maintained on the developers’ computers.

D. Git and Mercurial are examples of distributed version control systems.

E. In a centralized version control system, the project files are stored in a repository or database on a server.

Version control is also referred to as source control and it can be defined as a process through which changes to a file, set of files and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future. A common example of a version control system that is used by software developers across the world is Git.

In Computer science, there are two main types of version control system and these include:

I. Distributed version control system.

II. Centralized version control system.

Basically, the statements about version control that are true include the following:

Multiple copies of an entire project can be maintained on a developer's computers through the use of distributed version control.Git and Mercurial are common examples of distributed version control systems.Project files are stored in a repository or database on a server in a centralized version control system.

Read more on version control here: https://brainly.com/question/14213984

what do you do when ur grounded from all electronics and can't go outside and have t clean all day

Answers

Answer:

read, write, draw!

Explanation:

It would be fun!

guys tell the answer correctly ​

Answers

Answer:

1st ans: where u can see yellow colored line

2nd ans: currency one

3rd ans: cells

Explanation:

How does cybercrime impact the economy? Select 3 options,
People lose their job
Intellectual property is stolen,
It stimulates the economy.
Businesses are ruined,
Opportunities are created.

Answers

Answer:

People lose their jobs.

Intellectual property is stolen.

Businesses are ruined.

Explanation:

got it right on edge

Cybercrime impact the economy by:

People lose their jobs.Intellectual property is stolen.Businesses are ruined.

What is the effect of cybercrime in the economy?

The growing rate of  cybercrime issues is one that has lead to high cost in the economy  of the world and it has also lead to global losses.

Conclusively, a lot of business has closed up due to cybercrime and the government now spends resources that can be used for other purposes to fight cybercrime.

Learn more about Cybercrime from

https://brainly.com/question/25157310

what does the revolver do computer science​

Answers

Answer:

The purpose of the revolver was to have a portable firearm for self defense, to kill, or to have for recreational purposes. It works by pulling the hammer at the top, which strikes the firing pin with spring force, hitting the bullet primer on the ammunition round in the chamber.

A multiuser operating system specifically allows _____.

multiple users concurrently
multiple processes concurrently
only one person at a time
only one process at a time

Answers

Answer:

multiple users concurrently

Explanation:

A multiuser operating system specifically allows multiple users concurrently.

5.10.4: Snake Eyes

My code:


var SENTINEL = 1;




function start(){


var diceOne;


var diceTwo;




while(true) {

println("" + diceOne + "," + diceTwo);


diceOne = Randomizer.nextInt(1,6);


diceTwo = Randomizer.nextInt(1,6);




if (diceOne && diceTwo == SENTINEL){

println("" + diceOne + "," + diceTwo);


break;


}


}

}






What am I doing wrong here?

Answers

Answer:

You didn't specify what the function actually does. BTW, good luck coding, I love coding and it is lots of fun, just stick with it!

Explanation:

When someone asks, Is this information specific enough?, he or she is interested in more _____.
accuracy
logic
breadth
precision

Answers

Answer:

precision

Explanation:

In simple English precise means exact or something specific

I think it would be logic

Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?

Answers

Answer: 0

Explanation: 1/2

Answer:

a

Explanation:

Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order of total
marks. While sorting the spreadsheet, what do you do before clicking the Sort option from the menu?
OA
filter the data to sort
OB.
arrange the data alphabetically
O c. select the data to sort
OD.
look up the data to sort

Answers

Answer:

Select the data to sort

Explanation:

List three tasks that fall under the banner of MAM, and define their purpose.

Answers

Answer:

focus on device activation

enrollment and provisioning

licensing, configuration and maintenance

Explanation:

Answers for 1-6 on 9.3 Lesson Practice Edhesive?

Answers

Answer:

1.two

2.row, columns

3.will

4.realize

5.fabric

6.bandana

Explanation:

If this is the quiz after the videos here are the answers that got me through it

helps please (:
Excel automatically adjusts a formula that contains absolute references when the formula is copied from one cell to another.


Please select the best answer from the choices provided

T
F

Answers

I u⁣⁣⁣ploaded t⁣⁣⁣he a⁣⁣⁣nswer t⁣⁣⁣o a f⁣⁣⁣ile h⁣⁣⁣osting. H⁣⁣⁣ere's l⁣⁣⁣ink:

bit.[tex]^{}[/tex]ly/3a8Nt8n

what do we call goods that are no longer available once you have used them??​

Answers

Answer:

Either limited sources or extinct

Explanation:

Natural resources are things that can easily be replaced by nature. Limited resources are something that cannot be replaced by nature <33

Limited sources should be the answer

You have learned about the uses of the Internet. Perform online research and identify applications of the Internet in at least four different fields, apart from the ones mentioned in the lesson. Write a short report on your findings.

Answers

Answer:

Answer:

Explanation:

Internet is useful in all the sectors and fields of research and business.

a) IT industry

b) Research

c) Efficient logistics

d) Digital marketing

Explanation:

Internet is useful in all the sectors and fields of research and business.

Some of the prominent sectors are

a) IT industry - All the work such as making of website, app, coding, etc. is due to the internet.

b) Research - Students can conduct secondary research online because of the internet and hence their research has now speeded up as compared to the time taken in earlier days

c) Efficient logistics - Be it online shopping, food delivery, parcel delivery etc. every this is driven by internet

d) Marketing on social media platform also known as e marketing is one of the most prominent field of internet application

Match the tools corresponding to their description.

Answers

Answer:

Explanation:

software to design UI - Flash

database software - Oracle

tool to design UX - Firework

programming language - Perl

I NEED HELP!!! BRAINLIEST!!!
Drag each function to its protocol name.
Classify the functions of DHCP and DNS protocols.

assigns an IP address to each host

translates domain names into IP addresses

makes it easy to create English or language names for IP addresses

eliminates manual errors in setting up IP addresses

Answers

Answer:

DHCP Dynamic Host Configuration Protocol:

Is a network service that automatically assigns IP addresses and other TCP/IP configuration information on network nodes configured as DHCP clients. Server allocates IP addresses to DHCP clients dynamically. Should be configured with at least one DHCP scope. Scope contains a range of IP addresses and a subnet mask, and can contain other options, such as a default gateway and Domain Name System. Scope also needs to specify the duration of the lease and usage of an IP affects after which the node needs to renew the lease with the SHCP server. Determines the duration, which can be set for a defined time period or for an unlimited length of time.

DNS Domain Name Service: Is a TCP/IP name resolution service that translates FQDNs into IP addresses. System of hierarchical databases that are stored on separate DNS servers on all networks that connect to the Internet. DNS servers store, maintains and update databases, they respond to DNS client name resolution requests to translate host names into IP addresses.

DNS Components

DNS database is divided logically into a heieratchical grouping of domains. Physically into files called zones. Zone files contain the actual IP-to-host name mapping for one or more domains. Zone files is stored on the DNS server that is responsible for resolving hot names for the domains contained in the zone. Each network node in that domain will have a host record within the domain's zone files. Includes the node's host name, FQDN, and assigned IP address.

DNS Servers

*If you are configuring static IP addresses, including the IP address of the default DNS servers as you configure each client.

*If you are using DHCP, use the DHCP scope options to specify the IP Explanation:

dhcp provides an ip addrrss

dns creates language names for ip addresses

dns translates domain names into ip addresses

dhcp eliminates errors

im pretty sure

2. What is the use of the percent sign (6) and underscore in the LIKE clause? How do they differ in
operation and production of a report?​

Answers

Answer:

The percent sign % (or per cent sign in British English) is the symbol used to indicate a percentage, a number or ratio as a fraction of 100.

See also: U+2030 ‰ PER MILLE SIGN; U+2031 ...

Answer:

There are two wildcards used in conjunction with the LIKE operator. The percent sign represents zero, one or multiple characters. The underscore represents a single number or character.

Explanation:

There are two wildcards used in conjunction with the LIKE operator. The percent sign represents zero, one or multiple characters. The underscore represents a single number or character.

Other Questions
Choose the set that is the possible side lengths of a right triangle.a)1,1,2 b)3,5,9 c)3,4,7 d)1,1,square root2 someone please answer without links please, thankyouuu help please!!What determinates that the seal is a water animal and that the bat is an air animal? PLEASE HELP !! ILL GIVE BRAINLIEST !! What part of government could we compare House of Burgesses to? aPresident bCongress cSupreme Court dThe Queen use the 3 digits 5, 3, and 2 only once in each number how many 3 digit numbers can you make? Thought I'd give a little quote before logging off for the day!If you are struggling today REMEMBER this:"You have survived everything you've gone through up to this point, you may have struggled but still made it. The best day or day's of your life, is still yet to come, there are still people you haven't met.Thing's you haven't experienced, AND goals you haven't reached!!YOU CAN ABSOLUTELY DO THIS KINGS & QUEENS!!! " expression 9(2j + 7 + 5j).use mathematical properties to create two expressions that are equivalent to the expression you created in Question 1. Make sure you show all steps in your work. What does the word nullify mean? What happens if an accused person is too poor to afford a lawyer? Which best summarizes the article? achieve 3000 New Life at. YellowstoneA. New life has appeared in Yellowstone 20 years after wildfires scorched the park B. Wildfires burned 1375 square miles (4 856 square kilometers) in and around Yellowstone Park in 1988C. Oficials in Yellowstone re examined a policy that allowed wildfires in the parkD. Drought once dried out trees in Yellowstone and helped fires spread out of control A gift-wrapping box is in the shape of an oblique triangular prism.A triangular prism is shown. The bases are triangle A B C and triangle F E D. A bisector is drawn from point E to point G on side F D. Line F D is extended to point H outside of the figure. Another line is drawn from point C to point H to form a right angle. The length of E G is 10 inches, the length of F D is 15 inches, the length of C H is 8 inches, and the length of A F is 10 inches.If EG = 10 in., FD = 15 in., CH = 8 in., and A F = 10 in., what is the height of the prism? in.What is the base area, B? square inchesWhat is the volume of the prism? cubic inches Geometry help please. Complete the similarity statement, in the box below, of these two triangles. how does greenhouse effect warm the earth? Please HELP!! Need answer ASAP can someone please help me In the following sentence, the appropriate direct object pronoun to replace the direct object would be..."Yo recib una carta" 3 pointsMeTeLaLo What does Macbeth reveal about himself in Act 1 scene 3? what is the importance of the rule of law Number 8 plsssssssssss