The area that we can see just after windows is started is subject​

Answers

Answer 1

Answer:

The area that we can see just after windows is started is desktop or working area.


Related Questions

You are performing digital forensics in an enterprise that recently experienced a security breach. You successfully retrieved all volatile data, and your next focus is hard drives. How should you collect evidence from the hard drives without tainting any evidence

Answers

How should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.

What is mirror image backups?

Mirror image backups can be defined as a type of backup that enables you to backup all the document or items that you have on your computer hard drive.

Mirror image backup is vital because it enables you to have the same copy  of all the data or information that is store on your hard drive.

Therefore how should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.

Learn more about Mirror image backups here:https://brainly.com/question/21465714

how to select whose salary is between 1000 and 2000 in Microsoft access what is its criteria​

Answers

Answer:

Hey

In the query design view, go to criteria and choose the cell you want to put criteria on. type

>1000 AND <2000

paanswer po number 1, 2, 4, 6, 9, 15, 19 tyyyy​

Answers

Answer:

I hope it helps you

Explanation:

Pls do let me know if any doubt

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the _______

Answers

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.

What is ERP (Enterprise Resource Planning)?

The Enterprise Resource Planning or ERP is the software which is used by the organization to manage its essential elements such as sales, marketing, accounting etc.

The cloud used to manage this sensitive data is called the Cloud ERP.

Cloud ERP is the system which runs on the cloud platform of a vendor.This system allow the customers and organization to store and manage their sensitive data.

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.

Learn more about the Enterprise Resource Planning here;

https://brainly.com/question/14635097

#SPJ1

Select the correct answer from each drop-down menu.
David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive
platforms can David use for this presentation?
David can use an interactive
for his presentation.
or a?

Answers

The interactive platform that David can use for his presentation is the Powerpoint (Windows) platform.

What is Powerpoint?

Microsoft PowerPoint is an interactive platform (software) that can be used to create dynamic presentations.

Microsoft PowerPoint can be used to generate images, tables, and different types of graphics.

These images can be supported by multiple types of information (even financial information), which enables to show interactive presentations.

Learn more about interactive presentations here:

https://brainly.com/question/17173901

Which tab can help start a query? Create External Data File Home

Answers

The Create, External Data, File and Home tabs are in Microsoft Office Access

The Create tab can help to start a query

How to determine the tab?

There are several tabs in Microsoft Office Access.

Of all these tabs, the Create tab is used to help the user to start a query and return the required data of the query.

The other tabs such as file and home are used to perfom other tasks which include open files, save query, etc.

Read more about database at:

https://brainly.com/question/518894

Answer:

Its A Your Welcome

Explanation:

Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use

Answers

The technology that Isabella should  use to strengthen the security of her organization's networks is Network access control (NAC).

What is Network access control (NAC)?

Network access control (NAC), is popularly known to be  network admission control. This is said to be a kind of process that is known for hindering unauthorized users and devices from having any kind of access to any private network.

Note that the use of this Network access control (NAC) can help Isabella should  to strengthen the security of her organization's networks.

Learn more about  network engineer from

https://brainly.com/question/26563535

Do network packets take the shortest route?

Answers

Answer:

The packet will take a shorter path through networks 2 and 4

Answer:The packet will take a shorter path through networks 2 and 4, but networks 1, 3, and 5 might be faster at forwarding packets than 2 and 4. These are the kinds of choices network routers constantly make.What is shortest path routing in computer networks?

The goal of shortest path routing is to find a path between two nodes that has the lowest total cost, where the total cost of a path is the sum of arc costs in that path. For example, Dijikstra uses the nodes labelling with its distance from the source node along the better-known route.

Explanation:

question in the attached img. pls help me thank you in advance ​

Answers

Answer:here you go miss

Explanation:

1.A title bar is a graphical user interface (GUI) component of a software application or Web page.

2. A menu bar is a row or strip of menu items titles that, when clicked, display dropdown menu of other items or commands.

3. The toolbar, also called bar or standard toolbar, is a row of buttons, often near the top of an application window, that controls software functions.

4. Apache Axis (A pache e X tensible I nteraction S ystem) is an open-source, XML based Web service framework.

5. A status bar is located at the bottom of Internet browser windows and many application windows and displays the current state of the web page or application being displayed.

6. VCB box Type in value and press Enter to apply the

value to the active tool (no click required).

Which of the following is an example of reducing? (waste management)

- printing on both sides of a piece of paper instead of just one

-processing use paper into new sheets of paper

-writing a report about the benefits of reusing paper

-emailing a document instead of printing and mailing it

Answers

Answer:

emailing a document instead of printing and mailing it

A possible consequence of oversharing online might be:
A. receiving a great recommendation from a teacher.
B. getting accepted to the college of your choice.
C. stealing information from friends you do not trust.
D. being incriminated against or fired by an employer.

Answers

Answer:

D

Explanation:

A & B are not consequences

C is a consequence but not directed towards you but your friends

Software designed to facilitate conversation between a computer and a human end user is called?.

Answers

Answer:

User interface

Explanation:

I believe this would be referring to a user interface (or UI).

User interface is defined as a Software designed to facilitate conversation between a computer and a human end user.

What is the User interface?

The user interface (UI) of a device is the point of human-computer contact and communication. Keyboards, Display displays, mice, and the look of a desktop are all examples of this.

An interface in computing is a common boundary that allows two or more distinct components of a computer system to communicate information.

It is also the method through which a user interacts with a program or a website. A user interface is a piece of software that is meant to enable communication between a computer and a human end user.

Therefore, it is user interface.

Learn more about the User interface, refer to:

https://brainly.com/question/28351003

#SPJ2

The advantage of using a spreadsheet is:
Group of answer choices

Calculations can be done automatically

Changing data automatically updates calculations (as long as Excel is not set to calculate manually)

More flexibility

All of the above

Answers

because it's a good thing

Which two statements accurately describe this computer program? Click all that apply.
A. Clicking the green flag is the event that triggers the cat to move.
B. The code is written in C++, a block-based programming language.
C. The programmer refused a module to make the cat move and make noise.
D. There are two sprites, wearing cat and butterfly costumes.

Answers

Answers:
C & D

Explanation:
Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

What is Computer program?

Instructions must be expressed clearly and precisely since computers can only understand particular instructions or commands in the language that the user is programming them in.

Some computers require users to develop programs using blocks while others demand text-based languages since not all computers can comprehend the same things.

In contrast to computers, your acquaintance would be able to read beyond any spelling and grammar mistakes or request clarification if your handwriting was illegible if you opted to write down the instructions for them.

Therefore, Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

To learn more about Computer programe, refer to the link:

https://brainly.com/question/14618533

#SPJ7

You use trace precedents for a cell containing a formula. What indicates an error in the precedents used?.

Answers

When you use Trace Precedents for a cell containing a formula, an error in the precedents used would be indicated by a red tracer arrow.

What is Trace Precedents?

Trace Precedents can be defined as cells or groups of cells in Microsoft Excel that is used to review and determine which ones affect the value of an active cell.

IGenerally, when you use Trace Precedents for a cell in a spreadsheet document containing a formula, an error in the precedents used would be indicated by a red tracer arrow, which is displayed between the dependent and precedent cells.

Read more on cells here: brainly.com/question/26053797

What were the requirements to be an accountant 15 years ago? And what are the requirements now.

Answers

Answer:

Back then:

The first step is to determine your state's educational requirements for taking the CPA Exam. Recent grads usually need to have earned 150 college credits in order to sit for the CPA Exam. After obtaining the required amount of college credits, many students enroll in a CPA Review course just prior to sitting for the CPA Exam.

Now:

Aspiring accountants need a bachelor's degree in accounting or business to begin work in the field. A bachelor's degree usually takes about four years and 120 credits to complete. Those with an associate degree might enter the field as bookkeepers or accounting clerks.

Explanation:

Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = null; int total = 0; inputstream = new fileinputstream("data. txt"); infs = new scanner(filebytestream); while(xxx){ total = total + infs. nextint(); } system. out. println("total: " + total); group of answer choices inputstream. hasnextint( ) total != 0 infs. hasnextint( ) infs. eof( ) == false

Answers

Answer:

total+ infs . nex (xxx){total}

Explanation:

this is correct theres nothing wrong

Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 KB, 4 KB, 20 KB, 18 KB, 7 KB, 9 KB, 12 KB, and 15 KB. Which hole is taken for successive segment request of

Answers

Answer:

um uwu

Explanation:

The most popular productivity suite in the world is microsoft office. please select the best answer from the choices provided t f

Answers

Statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).

What is productivity suite?

productivity suite is a collection of programs desgined for the computer whcih has a word processor, presentation creater and spreadsheet creater.

Types of productivity suite-

Computer based productivity suite- This type of productivity suite are need to be installed the program on the computer, which can be work offline mode too.Online productivity suite- Online productivity suite are availeble on the internet and can be use whenever required without preinstallation.

Microsoft office 365 is the best and the oldest productivity suite. Most of the people are familier with this suite and it is most popular productivity suite in the market.

Thus, the statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).

Learn more about the productivity suite here;

https://brainly.com/question/2764685

What is the advantage of selecting the only create connection option when importing data?.

Answers

The advantage of selecting the only create connection option when importing data is that  there would be no tables or reports that will show in your workbook.

What is only create connection about?

The Only Create Connection option only is known to be an option given to a user so that they can save the script in the Excel workbook only.

Conclusively, If a user uses the select the option that is Only Create Connection, a form of data connection will be set up between the database and the workbook that you are working on and then there will be no tables or reports showing in the workbook.

Learn more about data from

https://brainly.com/question/19243813

When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET

Answers

When performing forensics on an Apple computer, the operating system are you the most likely to encounter is iOS.

What is operating system forensics?

A Operating System Forensics is known to be a method used for the retrieving of any useful information from the Operating System (OS) of the computer or any kind of mobile device.

Note that the reasons for collecting this information is so as to get all the empirical evidence against any kind of perpetrator.

Learn more about operating system from

https://brainly.com/question/1763761

Consider the following three classes class A{. }; class B{. }; class C : public B, virtual public A{. }; What is the order of invocation of constructors when an object of class C is instantiated?

Answers

The order of construct in the C++ programming language with the addition of the class instantiate is Class C, Class B, and Class A.

What is class instantiate?

In the computer language, class instantiate is given as the addition or the creation of the new class. The new class construct in the language helps in the creation of the new object.

In the C++ language, the order of constructor is given in top to bottom. The construct order will be:

Class CClass BClass A

Learn more about class instantiate, here:

https://brainly.com/question/9866466

#SPJ1

Please help me on this it’s due now

Answers

Answer:

All of the above because all the other factors are needed to be considered

What happens when the button is clicked? Open the functions drawer and look at each of the StateLibrary functions. Mouseover them for documentation. How do these functions work? Click "Manage Libraries" in the gear menu, then click "view code" for the State Library. Read the code. How do the library functions work? Were your predictions correct?

Answers

Library functions work by assesment through its function name.

What are Library functions?

Library functions are computer language that are made up of inbuilt functions which are grouped together in a place called library.

A library is the collection of resources or data used by computer programs for software development.

These resources may include:

configuration data,

documentation,

help data,

message templates and

pre-written code.

Therefore, Library functions work by assesment through its function name.

Learn more about library here:

https://brainly.com/question/5961530

Anyone know an "unblocked" alternative of giggl, or hyperbeam, maybe discord for a school chromebook while i wait during class since i'm literally finished with everything, or can you tell me how to unblock things on the chromebook.

Answers

You can get a VPN via the place where you get on your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend  Adguard VPN. You can create an account for free.

All data and bookman accounts will now start to be deleted from your Chromebook. You can now use your Chromebook without any limitations once you've finished.

What are the ways to unblock things on the Chromebooks?

This makes sure that neither other users nor unauthorized individuals may access your data by removing the Chromebook's hard drive and reading it. A Chromebook's “owner” is the first person to log in, and they have the option to control who else is permitted to log in if they so decide.

A VPN can be obtained from the same location where you download your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend  AdGuard VPN. You can create an account for free.

Therefore, On your Chromebook, it is not possible to transfer owner permissions to another account.

Learn more about Chromebook here:

https://brainly.com/question/23567863

#SPJ5

How would a user ensure that they do not exceed the mailbox quota?


The user can select a mailbox that does not have a quota.

The user can flag the items as Junk Mail.

The user can just move items to the Deleted Items folder.

The user must empty items from the Deleted Items folder or Archive items.

Answers

Answer:

I don't know about this one

What is ergonomic in computer and technology

Answers

Answer: Interaction with technology

Explanation: Computer ergonomics is the study of how we interact with our computers. Scientists that study computer ergonomics, attempt to find solutions to strain, fatigue, and injuries caused by poor product design or workplace arrangement. Their goal is to create an overall comfortable and relaxed workplace environment.

what should i do if my earbuds keep dying and not charge fully to where i get 2 minutes out of them

Answers

You could call apple customer service and tell them.

Answer:

Check the chord that plus into the case because it might need fixing. Buy a new cord or a new case. Or call apple customer service, and tell them the earbuds will not charge and they may give you a free pair! Be sure to make them feel like they are about to loose a customer and but still be sweet and respectful. If none of that works, you might have to buy a new pair :(

Explanation:

Good luck! and i hope this helped <3 Brainliest please? :)

How are data organized and manipulated in a database?

Answers

Answer:

What is Data Manipulation? Data manipulation refers to the process of adjusting data to make it organised and easier to read. These commands tell the database where to select data from and what to do with it.

Explanation:

Windows is a GUI Operating System, what is the other type?

Answers

Answer:

If you are looking for a different type of GUI operating system then :

Linux or mac

if you are looking for a different type of operating system (non-GUI):

Command-line interface

Explanation:

Other Questions
Answer 1-10 for branly all steps Using factor (2u 1), sin(x) = Using factor (5u + 1), or sin(x) = HELP!!! ASAP!!! construct a sequence of ten numbers with the same property using each of the numbers from 1 to 5 twice 1. Harnessing solar energy may include _____. Select all that apply.solar panelsphotovoltaic cellsturbineswindmills In what way does the relatively low level of judicial salaries negatively impact the judicial system i think therefore i am? the breakdown of phospho-creatine by creatine kinase generates ATP more rapidly than any other mechanism occurs in the cytosol or requires oxygen What is the volume of the prism? HELP PLEASE! FIND THE SURFACE AREA OF PRISM (WITH THESE NUMBERS) Having an attitude of respect can help usin all of the following ways EXCEPT:A. change how we view ourselvesB. change how we view othersC. allow us to judge ourselvesD. change how we act towards others Beinggreat78, this is mostly for you. but whoever gets it right can have brainliest, but answer ASAP! A guy wire runs from the top of a cell tower to a metal stake in the ground. Marques places a 11-foot tall pole to support the guy wire. After placing the pole, Marques measures the distance from the stake to the pole to be 3 ft. He then measures the distance from the pole to the tower to be 22 ft. Find the length of the guy wire, to the nearest foot. How does the word boy become a symbol? in the old man and the sea. How do the faded, transparent portires, or curtains, in the Wingfields' apartment affect the play?They emphasize the lack of privacy for Laura, who sleeps on the sofa in the living room.They serve as the walls of the apartment to distinguish one room from another for viewers.They evoke a dim, hazy appearance of the apartment, giving it the impression of a memory.They give the apartment a soft, feminine atmosphere, reminiscent of Amanda's Southern roots. Which is an example of a theme?A.) loveB.) deceptionC.) Everyone has dark secrets.D.) Dr. Hyde murdered Carew. Which graph represents the equation ? [ x - 1/2 ]^2 + [ y + 5/2 ]^2 = 1/4?Answer: 2 keratin is present in what parts of the body 4. Ryan bicycled 100 miles from his home. The table shows his distance, in miles, from home at different times.What was Ryan's average speed?A. 5 miles/hourB. 20 miles/hourC. 10 miles/hourD. 25 miles/hourRyan's Distance From HomeTime (hours) Distance(miles)1.5 302 402.5 503 60 Review the map that shows earthquake zones as yellow lines and active volcanoes as red dots. What pattern can you determine about the location of the volcanoes and the earthquake zones? Also explain why the earthquake zones are long lines on the globe. Write 3 to 5 sentences. Gabrielle is writing a research paper about how reindeer are adapted to their habitat. Which two websites will most likely give gabrielle relevant information for her research paper?