Use the drop-down tool to select the phrase that completes each sentence,
In Windows, deleted files go to the
If you want to see the most information about a file, you can view them in
A file manager can help you
DONE
I

Answers

Answer 1

Answer:

1. recycle bin

2. details view

3. move a file

Explanation:

i did the assignment on edge. and got it right

Answer 2

Answer:

In Windows, deleted files go to the

✔ Recycle Bin

If you want to see the most information about a file, you can view them in

✔ details view

A file manager can help you

✔ move a file

Explanation: Hope it helps ^w^


Related Questions

Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?

Answers

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Answers

The answer is the first number line.

30/150 = 1/5 = 20%

Answer:

20%

Convert fraction (ratio) 30 / 150 Answer: 20%

The first one.

Please I need one more braniest for 'expert' may I get it?

Explanation:

Designing the right elements for the tasks that the user is attempting to perform is called ________.

Answers

Answer:

Interface design

Explanation:

INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.

Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above

Answers

Answer:

d ) all of the above

Explanation:

is the correct answer

having a bad day? enjoy this front view of phinias (can't spell his name)​

Answers

Answer:

ouch what happened to him

congrats you ruined my childhood

(thanks for the free points!!)

What input is needed for the defined output?

Answers

Answer:

The data that are needed to be included in the output is called as

Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation

help please with the question in the photo

Answers

Answer:

A

Explanation:

A because, why would someone want to listen to your own interests?

What is the purpose of a Hyperlink

Can you answer both

Answers

Answer:

Number 16 is A Or B And Number 17 is B I think

Explanation:

Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?

Answers

Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.

Which important aspect of the Roman Empire did the barbarians destroy?

Answers

Answer:

centers of learning

Explanation:

Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.  

Answer:

i dont know but them barbs are crazy can't believe they were a thing back then

Explanation:

lol

If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decryption techniques, then you are learning about cryptography.

If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.

If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?

A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team​

Answers

Answer:

d

Explanation:

hi

Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?​

Answers

Answer:

no im not

Explanation:

but i sorry that you are

Question # 6
Dropdown
Choose the correct ending to the sentence below.


The function localtime() _____________________

Answers

Answer:

returns a different value every time you use it

Explanation: :)

Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia

Answers

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.

What are utopias and dystopias?

Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.

Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.

Learn more about utopias and dystopias, Here:

https://brainly.com/question/905235

#SPJ2

Assume the clock for a 4-bit binary counter is 80 kHz. The output frequency of the fourth stage (Q3) is

Answers

Answer:

5kHz

Explanation:

There are four stages so N = 2⁴ = 16.

The frequency at nth stage is given by

[tex]f_n = \frac{f_{clk}}{N} = \frac{80kHz}{16} = 5kHz[/tex]

The output frequency of the fourth stage (Q3) is 5kHz. Thus the correct option is A.

What is a 4-bit binary counter?

On each clock cycle, the 4-bit synchronous counter successively counts up from 0 (0000) to 15 as outputs ( 1111 ). It is also known as a 4-bit Synchronous Up Counter as result.

We required four Flip Flops to create a 4-bit counter, as indicated by the number 4 Flip Flops. The counter also has a reset pin, which enables it to enter an all-zero mode in which its output is "0."

The Q output of the previous flip-flop triggers the CLK input in the 4-bit counter above, as opposed to the Q output as in the up counter configuration, where the output of each flip-flop changes state on the rising edge.

There are four stages so N = 2⁴ = 16.

The 4-bit binary counter is 80 kHz.

In order to calculate the output frequency the  4-bit binary counter is divided by 16 which is equal to 5kHz.

Therefore, option A  is appropriate.

Learn more about the 4-bit binary counter, here:

https://brainly.com/question/29894384

#SPJ5

The complete question is Probably

Assume the clock for a 4-bit binary counter is 80 kHz The output frequency of the fourth stage (Q3) is. a) 5kHz. b) 10 kHz. c) 20 kHz. d) 320 kHz.

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links

Answers

Answer: b

Explanation:

If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );

Answers

Answer:

C) someThing.someMethod( )

Explanation:

The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.

In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.

Should video gaming be considered a school sport?

Answers

Answer:

I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.

Answer:

No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.

If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.

Answers

Answer:

D) Software problem

Explanation:

plz give me brainliest

D

edge2021      YWWWWWWWWWWWWWWWWWWWWW                                  

Always place the smallest dimensions ____ the object, with ____ the object.
Question 2 options:

A) closest to; progressively smaller dimensions outward from

B) closest to; progressively larger dimensions outward from

C) farthest from; progressively smaller dimensions above

D) farthest from; progressively larger dimensions above

E) none of the above

Answers

The answer is B (Closest to; progressively larger dimensions outward from

8. Write the examples of freeware and Shareware softwares ?

Answers

Explanation:

People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.

Freeware software:

Adobe PDF

yahoo messenger

Go.ogle Talk

MSN messenger

People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.

Shareware software:

Adobe acrobat 8 professional

Winzip

Getright

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.

Answers

The answer is the 2 one becuase I took the test

What is the missing line of code?

>>> phrase = "You are amazing!"
>>> _____
'u a'

phrase[3:6]

phrase[2:6]

phrase[3:5]

phrase[2:5]

Answers

Answer:

phrase[2:5]

Explanation:

Given:

The above code segment

Required

Which instruction returns 'u a'

First, we need to get the index of u in the phrase:

u is at the third position but in programming, index starts at 0.

So, u is at index 2

Next, we need to get the index of a in the phrase:

a is at index 4

One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]

Where:

[tex]start = 2[/tex] ----- index of u

[tex]stop = 4[/tex]  ----- index of a

phrase ---- The string variable

So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]

Where 5 = 4 + 1

Answer:

phrase[2:5]

Explanation: got it right on edgen

what is the operating system on an IBM computer?​

Answers

Answer:

OS/VS2 and MVS

Explanation:

IBM OS/2, is full International Business Machines Operating System/2, an operating system introduced in 1987 IBM and the Microsoft Corporation to operate the second-generation line of IBM personal computers, the PS/2 (Personal System/2.) hope this helps! Pleas mark me as brainliest! Thank you! :))

What is Microsoft PowerPoint?
Oa presentation program included with Microsoft Office
oa project management program available only in certain versions of Microsoft Office
Oa desktop publishing program included with Microsoft Office
oa collaboration program available only in certain versions of Microsoft Office

Answers

Answer:

ITS THE FIRST ONE :)

Explanation:

ALSO IF ITS NOT THE FIRST ONE GO ON YT!

Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.


religion

product or service

governmental policy

idea

Answers

Answer:

product or service

Explanation:

Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.

Answer:

A.) Product or service

Explanation:

Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.

What is the best use of network in homes

Answers

Answer:

Spectrem

Explanation:

Other Questions
At what age did Siddhartha begin his search for the solution to suffering? What is the unit cost of the olives at Mangio's In a physical change, the molecules inside a substance_____________before and after.A.stay the sameB.changeC.vary betweenD.travel between the subjects of Oceanic art are usually about ___A- farming,trade,and governmentB. Human sacrifice or military conquestC. fertility , human leaders, and the supernaturalD. nature or everyday objects The null hypothesis for an ANOVA is that all treatments/samples come from populations with the same mean. The alternative hypothesis is best stated as:____________ How do you feel now as a student given the right to enroll in the senior high school? Weird obsessions that you have or someone you know has? Juan pago $50.00 pesos por 3 cajas de paquetes y 5 cajas de clavos, mientras que Pedro compr 5 cajas de taquetes y 7 cajas de clavos y tuvo que pagar $ 74.00 pesos . Cual es el precio de cada caja de taquetes y clavos ? a) Cuantas incgnitas hay en el problema ? b) Cuntas ecuaciones puedes construir segn el texto?c) Cuales son esas ecuaciones? what were some factors that needed to be considered when designing the display of starry night Separate the following gene sequence into codons: TACGTCTTACGCTATGTCAnswer really quick plssss The early civil rights leader who served as an editor of Oklahoma Citys only African American newspaper after World War II was __________.A.George McLaurinB.Roscoe DunjeeC.Clyde BellecourtD.Clara Luper Which equation best represents the relationship between x and y in the graph?yA. O y = 4x - 1B.Oy = 12-1C.y = 4x + 1DO g =1x +1 Trouvez le mot qui correspond chaque dfinition. Utilisez l'article dfini ou indfini ncessaire.QuestionsQuestion 1 with 1 blank 1 of 1 Un jeu de stratgie qui utilise un tableau (board) et plusieurs pices.Question 2 with 1 blank 1 of 1 Pratiquer un sport o on glisse sur la neige.Question 3 with 1 blank 1 of 1 Un livre souvent trs mince qui raconte une histoire avec des illustrations et du texte.Question 4 with 1 blank 1 of 1 Un groupe sportif compos de plusieurs (several) personnes.Question 5 with 1 blank 1 of 1 Une priode pendant laquelle (during which) vous avez trs peu d'obligations.Question 6 with 1 blank 1 of 1 Dans ce jeu, il y a quatre rois et quatre dames. 210=157-wsolve for w Where was the first permanent European settlement in what is now the United States?A.St. Augustine, FloridaB.New Orleans, LouisianaC. Plymouth, MassachusettsDJamestown, VirginiaNeed help ASAP The surface area of a three-dimensional object is the sum of the area of the faces. If represents the length of the side of a cube, write a formula for the surface area S of the cube. Worth 30 points! Questions are below. Explain in detail please. Which of The following are challenges to implementing sustainable farming practices? Select two correct answers.a. increased need for fertilizerb. lack of pollinating insectsc. higher initial costsd. increased erosione. increase labor costs Which of the following hormones do not regulate blood glucose?GlucagonEpinephrineInsulinPancreatic lipase A parabola had a vertex at (3,4) and passes through the point (5,-4) what is the standard form equation for the parabola.. help pleasee