DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.

Please
I need help​

DIRECTIONS: Organize Your Desktop. Name The 5 Folders Based On The Files Given Below. Organize Your Own

Answers

Answer 1

Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios


Related Questions

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

PLEASE HELP!!! DECENT AMMOUNT OF POINTS!! DRIVERS ED


An automatic transmission is a mechanism that

A. automatically turns on your car

B. automatically turns off your car

C. selects the best gear for the situation

D. Connect your radio to air signals

Answers

Answer:

c. Selects the best gear for the situation.

Explanation:

Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.

Answers

Answer:

B. television

Explanation:

Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .

Answers

Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.

A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;

System softwareUtility softwareApplication software

An application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.

According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:

Social networkingDatingEntertainmentGamingNewsWeb browsing

On the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:

HealthExerciseReadingRelaxationEducation

Find more information: https://brainly.com/question/14379808

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

what is a collection of web pages containing text images audio and videos.​

Answers

Answer: A website..?

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

to center data in a cell, click the ____ button on the ribbon.

Answers

To center data in a cell, click the center  button on the ribbon.

Data in a cell can be aligned either  horizontally or vertically .

For the  horizontal alignments, we have

against the left border, against the right border, and in the centre.

For the  vertical alignments, we have

against the top border, against the bottom border, and in the middle.

To center data, the following steps should be followed.

1.Click the cell where you want to center the data.  

2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.

3.Click the  drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.

4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

Answers

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

Convert the binary (base-2) number 1110 1001 to decimal (base-10).

Answers

Answer:

233

Explanation:

alright bro, listen. lets do some QUICK MAFFS.

from right to left.. we start from 1, and then double the number. so it would kind of look like this:

128 64 32 16  8 4 2 1

ok so whenever you are converting binary to decimal, make sure you have those numbers underneath the ones and zeroes.

[tex]1 \ \ \ \ \ 1 \ \ 1 \ \ \ 0 \ \ 1 \ 0 \ 0 \ 1\\128 \ 64 \ 32 \ 16 \ \ 8 \ 4 \ 2 \ 1[/tex]

ok so you see how the ones and zeroes are perfectly above the reference we are using?

so each one that has a one, add the number underneath it together

128 + 64 + 32 + 8 + 1

equals 233

LISTEN. STAY AWESOME GAMER!

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

You want to kill all process IDs of a specific process with a single command. Which command should you use

Answers

Answer:

killall

Explanation:

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

Which Windows Server 2016 core technology provides a single interface for installing, configuring, and removing a variety of server roles and features on your Windows server

Answers

Answer:

Server manager

Explanation:

You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Answers

Answer:

hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Explanation:

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext

Answers

The answer is decryption

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

Other Questions
Can someone help me out How can sand dunes be rebuilt? Reese wrote this essay for his biology class. Read Reeses essay and look for any revisions he needs to make. When you finish reading, answer the questions that follow. A New Discovery about the Brain (1) But there is still one part of the human body that confuses scientists: the brain. (2) Although scientists have made extraordinary progress in understanding how the brain functions, there still is much to learn. (3) In fact, scientists are only now beginning to discover and understand the lymphatic system of the brain. (4) The lymphatic system performs an important role in the overall functioning of the body, much like the circulatory system. (5) The lymphatic system also moves things around the body. (6) Instead of bringing the body what it needs through the blood, however, the lymphatic system carries away what the body doesnt need, such as germs and waste products, through a fluid called lymph. (7) The lymph then travels to the various lymph nodes throughout the body. (8) As the lymph is filtered through the lymph nodes, the nodes respond to any germs by mounting an appropriate defense. (9) Scientists have been stumped by this process. (10) But in 2012 scientists found that the brain has its own type of lymphatic system. (11) Dr. Maiken Nedergaard and her team of researchers were surprised and excited to discover the first evidence of a tightly interwoven system that rapidly removes waste from the brain. (12) The brains blood vessels have fluid that is running along the side of them, the team determined, and this fluid is what is carrying waste away from the brain. (13) However, unlike the lymphatic systemwhich operates on a slow, continuous basisthis newly discovered system operates only when a person is asleep, washing away waste by flooding the brain quickly with fluid. (14) Now you have one more reason to get a good nights sleep. (15) It took three more years for scientists to discover the specific vessels in the brain that are part of this lymphatic system. (16) In 2015, researchers were able to provide proof of a lymphatic system in the brain when they actually managed to see the vessels that are used to flood the brain and carry away the waste. Even though what this relatively new discovery means is still not entirely clear, researchers are already making connections. (18) For example, many brain diseases, including Alzheimers disease, involve the accumulation of specific proteins in the brain. (19) Although it is too early to jump to conclusions, it is reasonable to infer that these diseases may be connected in some way to the ability of this newly discovered lymphatic system to remove waste from the brain. (20) In the future, scientists will attempt to prove this connection. (21) The discovery of an entirely new system opens up exciting new areas of research and inquiry. (22) It may offer more opportunities for discoveries as researchers increase their understanding of how this system functions and how it is related to health and disease. (23) Eventually, we may gain a fuller understanding of the mysterious workings of the human brain. 1) Reese needs to improve the introduction of his essay. Which sentence should be added before sentence 1 to create a more effective introduction for his essay? A) There are so many mysteries about the human body that you would never believe it. B) The brain is like the bodys big jigsaw puzzle C) Over the past centuries, many of the mysteries of the human body have been explained by science. D) Scientists are determined to find out all the facts that can help them understand our world Which of these is not a part of the U. S. Constitution?the invocationpreambleamendmentsarticles The fraction 7/9 is found between which pair of fractions on a number line?A) 3/5 and 3/4B) 7/10 and 4/5C) 7/10 and 3/4D) 3/5 and 2/3 for each type of geometry in the simulation, examine the resulting bond angles by clicking the show bond angles checkbox. based on your observations for each geometry, provide the bond angles at the indicated locations for the two-dimensional representations of the three-dimensional structures. Find the slope. simplify if needed.(-10,5) and (2, -3) A student is writing an essay about the future of space exploration. Which sources are the most reliable? Select all that apply. Which expression is equivalent to 4(6 - 2x) ? In 2013, the Public Religion Research Institute conducted a survey of 1,033 adults, 18 years of age or older, in the continental United States. One of the questions on their survey was as follows:On any given Sunday, are you more likely to only be in church, more likely to only be watching football, doing both, or doing neither?(a) To only be in church [269 respondents selected this answer](b) To only be watching football [175 respondents selected this answer](c) Doing both [217 respondents selected this answer](d) Doing neither [372 respondents selected this answer]Create a 95% confidence interval to estimate the actual percentage of adults in the U.S., aged 18 and older, that are "likely" to ONLY be in church on any given Sunday. How did George Washington influence the creation of the Constitution?A:He created the Great Compromise.B:He was chosen to lead the Constitutional Convention.C:He acted as "Father of the Constitution" because he wrote much of it.D:He introduced the New Jersey Plan. write sentences about your achievements what is the hcf of 18 27 and 81 by prime factorization What is the approximate area of a circle with a diameter of 10in exposicin del 5 de diciembre del 1492 Why were slaves a more stable workforce than indentured servants?1. Slaves served for a fixed term.2. Slaves were forced to serve for life. what is a protein that recognizes and responds to a signal Solve pls brainliest day in day out, make sentence by putting the words in the correct order 25 points! I really need some help.