To copy a selected file to an external drive, right-click the file, point to __________ on the shortcut menu, and then click the drive, such as Drive E:.

Answers

Answer 1

Answer:

send to

Explanation:

method of copy and move fro shortcut menu is

for copy : right click a file and than click copy shortcut menu, right click the final location folder and than click on paste  or CTRL + C and then CTRl + V

and

for move:  right click a file and than click cut shortcut menu, right click the final location folder and than click on paste . or CTRL + X and  then CTRl + V


Related Questions

Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?

Answers

Answer:

The company effectively implemented patch management.

Explanation:

From the question we are informed about a scenario whereby A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. In this case The company effectively implemented patch management. Patch management can be regarded as process involving distribution and application of updates to software. The patches helps in error correction i.e the vulnerabilities in the software. After the release of software, patch can be used to fix any vulnerability found. A patch can be regarded as code that are used in fixing vulnerabilities

2.12.1: LAB: Name format

This is what I have so far:

name_input = input()

name_separator = name_input.split()

if len(name_separator) == 3:

first_name = name_separator[-3]

middle_name = name_separator[-2]

last_name = name_separator[-1]

first_initial = first_name[0]

middle_initial = middle_name[0]

last_initial = last_name[0]

print(last_name + ", " + first_initial + '.' + middle_initial +'.')



elif len(name_separator) == 2:

first_name = name_separator[-2]

last_name = name_separator [-1]

first_initial = first_name[0]

last_initial = last_name[0]

print(last_name + ", " + first_initial + ".")

2.12.1: LAB: Name formatThis is what I have so far:name_input = input()name_separator = name_input.split()if

Answers

A program that reads a person's name in the following format: first name, middle name, last name is given below:

The Program

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

 Scanner scnr = new Scanner(System.in);

 String firstName;

 String middleName;

 String lastName;

 String name;

 name = scnr.nextLine();

 int firstSpace = name.indexOf(" ");

 firstName = name.substring(0, firstSpace);

 int secondSpace = name.indexOf(" ", firstSpace + 1);

 if (secondSpace < 0) {

    lastName = name.substring(firstSpace + 1);

    System.out.println(lastName + ", " + firstName);

 }

 else {

    middleName = name.substring(firstSpace, secondSpace);

    lastName = name.substring(secondSpace + 1);

    System.out.println(lastName + ", " + firstName + " " +     middleName.charAt(1) + ".");

 }

 }

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

http://www.alegrium.com/sgi/2/eibder
yeah.... I kinda want some gems so.... can u ppl like.....help me out?

Answers

Answer:

so what is this uhhhhhhhhhh

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

Answers

Answer: Server

Explanation:

Options include:

A.Laptop

B.Server

C.Game console

D.Workstation

A server is referred to as a computer that helps in the provision of services, data or resources to other systems over a particular network.

Since the game developer wants a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded, the server is the best option for this.

states that processing power for computers would double every two years

Answers

Answer:

Moore's Law

Explanation:

Joseline is trying out a new piece of photography equipment that she recently purchased that helps to steady a camera with one single leg instead of three. What type of equipment is Joseline trying out?

A. multi-pod

B. tripod

C. semi-pod

D. monopod

Answers

Joseline trying out tripod .A camera-supporting three-legged stand is known as a tripod. For stability, cameras are fixed on tripods, sometimes known as "sticks." In tripods, the fluid head is used. The camera may now tilt up and down in addition to pan left and right.

What tools are employed in photography?You will need a camera with manual settings and the ability to change lenses, a tripod, a camera case, and a good SD card if you're a newbie photographer who wants to control the visual impacts of photography. The affordable photography gear listed below will help you get started in 2021.A monopod, which is a one-legged camera support system for precise and stable shooting, is also known as a unipod.A camera-supporting three-legged stand is known as a tripod. For stability, cameras are fixed on tripods, sometimes known as "sticks." In tripods, the fluid head is used. The camera may now tilt up and down in addition to pan left and right.

To learn more about tripod refer to:

https://brainly.com/question/27526669

#SPJ1

Answer:

monopod

Explanation:

What is the binary of the following numbers
10
6
22
12

Answers

You can use this table to help you!

Answer:

10 = 00001010

6 = 00000110

22 = 00010110

12 = 00001100

What is the binary of the following numbers 1062212

Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.

Answers

Answer:

Answered below

Explanation:

In order to not discourage the user, error messages must be implemented in a user-friendly way with the use of strategies which ensure coordination, consistency and simplicity.

Error messages should be short, direct and communicate clearly, the right amount of information to a user. These messages should be sorted into categories which represent different kinds of errors. These specific categories should have a brief alphanumeric code that can be easily shared with a customer support personnel for solution and also to help users search for solutions themselves, on the internet.

_______Is the process of organizing data to reduce redundancy
O A. Specifying relationships
O B. Duplication
O C. Primary keying
O D. Normalization

Answers

Answer:

the answer is D

Explanation:

Normalization is the process of reorganizing data in a database so that it meets two basic requirements:

There is no redundancy of data, all data is stored in only one place.

Data dependencies are logical,all related data items are stored

In JAVA with comments: Consider an array of integers. Write the pseudocode for either the selection sort, insertion sort, or bubble sort algorithm. Include loop invariants in your pseudocode.

Answers

Here's a Java pseudocode implementation of the selection sort algorithm with comments and loop invariants:

```java

// Selection Sort Algorithm

public void selectionSort(int[] arr) {

   int n = arr.length;

   for (int i = 0; i < n - 1; i++) {

       int minIndex = i;

       // Loop invariant: arr[minIndex] is the minimum element in arr[i..n-1]

       for (int j = i + 1; j < n; j++) {

           if (arr[j] < arr[minIndex]) {

               minIndex = j;

           }

       }

       // Swap the minimum element with the first element

       int temp = arr[minIndex];

       arr[minIndex] = arr[i];

       arr[i] = temp;

   }

}

```The selection sort algorithm repeatedly selects the minimum element from the unsorted part of the array and swaps it with the first element of the unsorted part.

The outer loop (line 6) iterates from the first element to the second-to-last element, while the inner loop (line 9) searches for the minimum element.

The loop invariant in line 10 states that `arr[minIndex]` is always the minimum element in the unsorted part of the array. After each iteration of the outer loop, the invariant is maintained.

The swap operation in lines 14-16 exchanges the minimum element with the first element of the unsorted part, effectively expanding the sorted portion of the array.

This process continues until the entire array is sorted.

Remember, this pseudocode can be directly translated into Java code, replacing the comments with the appropriate syntax.

For more such questions on pseudocode,click on

https://brainly.com/question/24953880

#SPJ8

an individual’s Body Mass Index (BMI) is a measure of a person’s weight in relation to their height. it is calculated as follows: • divide a person’s weight (in kg) by the square of their height (in meters) design and implement a program to allow the user to enter their weight and height and then print out their BMI by using java

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 float weight, height,bmi;

 System.out.print("Enter weight (kg) and height(m): ");

 weight = input.nextFloat();

 height = input.nextFloat();

 bmi = (weight)/(height*height);

 System.out.print("BMI: "+bmi);

}

}

Explanation:

This declares all variables as float

 float weight, height,bmi;

This prompts the user to enter weight and height

 System.out.print("Enter weight (kg) and height(m): ");

This next two lines get input from the user for weight and height

 weight = input.nextFloat();

 height = input.nextFloat();

This calculates the bmi

 bmi = (weight)/(height*height);

This prints the bmi

 System.out.print("BMI: "+bmi);

Given numStack: 74, 84, 38 (top is 74)
What is the stack after the following operations?
Push(numStack, 22)
Pop(numStack)
Push(numStack, 46)
Pop(numStack)

Answers

Answer:

After the first operation, Push(numStack, 22), the stack becomes 74, 84, 38, 22, with 22 at the top.

After the second operation, Pop(numStack), the top element 22 is removed from the stack, so the stack becomes 74, 84, 38, with 38 at the top.

After the third operation, Push(numStack, 46), the stack becomes 74, 84, 38, 46, with 46 at the top.

After the fourth operation, Pop(numStack), the top element 46 is removed from the stack, so the stack becomes 74, 84, 38, with 38 at the top.

Therefore, the final stack after these operations is 74, 84, 38, with 38 at the top

Explanation:

Which of the following statements about markup languages is true?
• Markup languages are used to write algorithms.
Markup languages are used to structure content for computers to interpret
JavaScript is an example of a markup language.
Markup languages are a type of programming language.

Answers

The most widely used markup languages are SGML (Standard Generalized Markup Language), HTML (Hypertext Markup Language), and XML (Extensible Markup Language).

B .Markup languages are used to structure content for computers to interpret is true.

What is a markup language in programming?

A markup language is a type of language used to annotate text and embed tags in accurately styled electronic documents, irrespective of computer platform, operating system, application or program.

What does a markup language used to identify content?

Hypertext markup language is used to aid in the publication of web pages by providing a structure that defines elements like tables, forms, lists and headings, and identifies where different portions of our content begin and end.

To learn more about A markup language, refer

https://brainly.com/question/12972350

#SPJ2

please help.........​

please help.........

Answers

Answer:

hume and note that the best way to download the new version apk was the same you can give answer to download free and free from free to free and unlimited use and free download free

Explanation:

guys I can tell me about how you feel when I am sorry about that and not coming from you are mute I

which of the following is not the correct definition of an operating system

A.

it controls all other execution in a computer

B.

interface between hardware and application programs

C.

its a platform for ensuring that other executions has taken place

D.

maintains consistency of data loss during execution

Answers

The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.

any device that performs single conversion is ____​

Answers

Answer:

modulator

Explanation:

A modulator is a device that performs modulation.

(Single conversation)

How can you compute, the depth value Z(x,y) in
z-buffer algorithm. Using incremental calculations
find out the depth value Z(x+1, y) and Z (x, y+1).
(2)

Answers

The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.

Thus, The pixel to be drawn in 2D is the foundation of image space approaches and Z buffer. The running time complexity for these approaches equals the product of the number of objects and pixels.

Additionally, because two arrays of pixels are needed—one for the frame buffer and the other for the depth buffer—the space complexity is twice the amount of pixels.

Surface depths are compared using the Z-buffer approach at each pixel location on the projection plane.

Thus, The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.

Learn more about Z buffer, refer to the link:

https://brainly.com/question/12972628

#SPJ1

What methods do phishing and spoofing scammers use?

Answers

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

What is the purpose of extent in lines in engineering drawing

What is the purpose of extent in lines in engineering drawing

Answers

Answer:

Extension lines are used to indicate the extension of a surface or point to a location preferably outside the part outline.

Explanation:

the differencebetween browser and search engine
please my assignment have50 mark

Answers

Answer:

A browser is a piece of software that retrieves and displays web pages; a search engine is a website that helps people find web pages from other websites.

An IT systems engineer creates a new Domain Name System (DNS) zone that contains a pointer (PTR) resource records. Which zone type has been created?

Answers

Answer: Reverse DNS zone

Explo: a reverse DNS zone needs a PTR record since it is in charge of resolving the IP address to a domain or a hostname.

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?A. freewareB. open sourceC. Software as a Service (SaaS)

Answers

Answer:

B. Open Source!!!!

Explanation:

Just took the test and this is the correct answer I promise!

The interviewer is referring to open-source programs.

The correct option is B.

Open-source software is a type of software that provides users with the freedom to use, modify, and distribute the program without restrictions. It typically includes the source code, allowing users to inspect, modify, and enhance the software according to their needs.

Open-source programs are developed collaboratively by a community of developers and are often available for free or at a lower cost compared to proprietary software. Users have the freedom to customize the software, fix bugs, add features, and distribute their modifications to others.

Freeware, on the other hand, refers to software that is available for free but does not necessarily provide the freedom to modify and distribute the program without restrictions. Freeware may have limitations on usage, redistribution, or access to the source code.

Software as a Service (SaaS) is a different concept where software applications are provided as a service over the internet, typically on a subscription basis. SaaS applications are not necessarily open source or freeware, as their distribution and usage terms vary depending on the specific service provider.

Learn more about Open source Program here:

https://brainly.com/question/14605142

#SPJ6


Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Answers

Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.

Writting the code:

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

Number of DB pages allocated = 270

Sweep interval = 20000

Forced Writes are ON

Transaction - oldest = 190

Transaction - oldest active = 191

Transaction - oldest snapshot = 191

Transaction - Next = 211

ODS = 11.2

Default Character set: NONE

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

...

Default Character set: NONE

See more about SQL at brainly.com/question/19705654

#SPJ1

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

similarities between inline css and internal css​

Answers

Answer:

CSS can be applied to our website's HTML files in various ways. We can use an external css, an internal css, or an inline css.

Inline CSS : It can be applied on directly on html tags. Priority of inline css is greater than inline css.

Internal CSS : It can be applied in web page in top of the page between heading tag. It can be start with

Corrine is writing a program to design t-shirts. Which of the following correctly sets an attribute for fabric? (3 points)

self+fabric = fabric
self(fabric):
self = fabric()
self.fabric = fabric

Answers

The correct option to set an attribute for fabric in the program would be: self.fabric = fabric

What is the program

In programming, defining an attribute involves assigning a value to a particular feature or property of an object. Corrine is developing a t-shirt design application and intends to assign a characteristic to the t-shirt material.

The term "self" pertains to the specific object (i. e the t-shirt) which Corrine is currently handling, as indicated in the given statement. The data stored in the variable "fabric" represents the type of material used for the t-shirt.

Learn more about program  from

https://brainly.com/question/26134656

#SPJ1

design the logic for a program that allows a user to enter a number. display the sum of every number from 1 through the entered number

Answers

Answer: int sum = 1, n;

do {cin>>n; sum+=n;}while (n!=0);

cout<<sum;

Explanation:

A large gambling company needs to be able to accept high volumes of customer wagers within short timeframes for high-profile sporting events. Additionally, strict laws prohibit any gambling activities outside of specially-licensed business zones.
What is an example of an effective, elastic Cloud solution that can meet this client's needs?

Answers

An example of an effective, elastic Cloud solution that can meet this client's needs is: a. mobile app that only accepts wagers based on the user's location.

What is cloud computing?

Cloud computing can be defined as a type of computing that requires the use of shared computing resources over the Internet rather than the use of local servers and hard drives.

The characteristics of cloud computing.

In Computer technology, the characteristics of cloud computing include the following:

On-Demand self-service.MultitenancyResource poolingElasticity

In this scenario, we can infer and logically deduce that mobile app that only accepts wagers based on the user's location is an example of an effective, elastic Cloud solution that can meet this client's needs.

Read more on cloud computing here: https://brainly.com/question/19057393

#SPJ1

Complete Question:

A large gambling company needs to be able to accept high volumes of customer wagers within short timeframes for high-profile sporting events. additionally, strict laws prohibit any gambling activities outside of specially-licensed business zones. what is an example of an effective, elastic cloud solution that can meet this client’s needs? a. mobile app that only accepts wagers based on the user's location b. machine that generates paper betting slips that are brought to a cashier c. on-site computer terminals where customers can line up to place bets d. a website that gamblers can access from their home computers e. none of the above

Source code is one particular representation of a software system. It highlights some details and hides others. This is a good example of: Group of answer choices Prototyping Abstraction Divide-and-conquer Incrementality Rigor and formality

Answers

Answer:

Abstraction

Explanation:

Under fundamental principles of software engineering, the term "abstraction" is simply defined as the act of highlighting some details and hiding other ones.

Thus, the correct answer among the options is Abstraction.

When a source code highlights some details and hides others, it is a good example of abstraction.

Under the fundamental principles of software engineering, the term "abstraction" refers to an act of highlighting some details and hiding other ones.

Hence, when a source code highlights some details and hides others, it is a good example of abstraction.

Therefore, the Option B is correct.

Read more about abstraction

brainly.com/question/25964253

Twisted pair cables characteristics

Answers

Twisted pair cables are a type of copper cable consisting of two insulated wires twisted together to reduce electromagnetic interference.

What varieties do they come in?

They come in two varieties, shielded and unshielded, and can support data transmission rates up to 10 Gbps over short distances. They are commonly used for Ethernet networking, telephone systems, and other communication applications.

Twisted pair cables have a maximum length of around 100 meters, and their performance can be affected by factors such as cable quality, interference from other devices, and environmental conditions.

Read more about twisted pair cables here:

https://brainly.com/question/13187188

#SPJ1

Your cousin gets a weekly allowance, but he always seems to be out of money anytime you buy snacks or go out to watch a movie. You recommend he create a budget, but he says, “No way! That would take so much effort, and I don’t think it’d work anyways! It’s not worth it.” What do you tell him to convince him that a budget could help?

Answers

Answer:

If you want to have more fun with your money, you need a budget. A budget is not a boring thing that tells you what you can't do. It's a smart thing that helps you do what you want to do. Here's how:

- A budget helps you save up for the things you really want, like a trip to Hawaii, a new laptop, or a debt-free life. It also helps you deal with the things you don't want, like a broken car, a hospital bill, or a late fee.

- A budget helps you stop wasting money on the things you don't care about, like snacks you don't eat, movies you don't watch, or subscriptions you don't use. It also helps you find ways to save more money on the things you do care about, like groceries, utilities, or entertainment.

- A budget helps you feel more relaxed and happy about your money. Instead of always stressing about running low on cash or owing money to someone, you can have a clear view of your finances and make smarter choices. You can also enjoy spending money on the things you love without feeling guilty or anxious.

- A budget helps you build good money skills that will last a lifetime. By learning how to budget, you will become more responsible, disciplined, and organized with your money. You will also learn how to prioritize your needs and wants, and how to balance your spending and saving.

So don't think of a budget as something that limits your fun. Think of it as something that enhances your fun. A budget is not a problem. It's a solution.

Other Questions
Consumers _____.A.) break down dead material into nutrientsB.) eat only meatC.) eat other organisms for energyD.) make their own food An action force is 50 N to the left. The reaction force must be:A. 50 N rightB. 50 N downC. 50 N leftD. 50 N up If you want the ball to land in your hand when it comes back down, should you toss the ball straight upward, in a forward direction, or in a backward direction, relative to your body Empareja la frase con el verbo correcto. Pair the sentence with the correct verb. (4 points)1. A la casa le ________ los azulejos tpicos de la arquitectura mudjar.2. Las tapas les ________ por dos o tres personas.3. Las aldeas de Argentina me ________ como las de Espaa.4. Nos ________ los vegetales de temporada ms que la ensalada.a. bastanb. parecenc. agradand. faltanSpanish speakers only plz for the matching question you should know basic info we mentioned in class about all of the following: immanuel kant, jeremy bentham, john stuart mill, judith jarvis thomson, peter singer, james rachels, rita manning, johnathan haidt, friedrich nietzsche, karl marx, ayn rand. What is the GCF? 2x2-4x+8 What is the value of -7 1/2 +4 3/4 -(-4) in your own words, explain why we need ip addresses in order for the internet to function properly. (TRUE OR FALSE) Because the Black Codes encouraged travel, it was easier to find work. A meal providing 1200 kcalories contains 10 grams of saturated fats, 14 grams of monounsaturated fats, and 20 grams of polyunsaturated fats. What percentage of energy is from fats Bill has to choose between a 10% off coupon and a coupon that saves $10.00. Which of the following totals would allow Bill to save more with the $10 coupon? Answer choices: $140 $120 $100 $80 ________ believed that the four elements (fire, earth, air, and water) combined with two first principles (love and strife). He believed that harmony and balance were important to survival. Smith recently faced a choice between being (a) an economics professor, which pays $50,000/yr, or (b) a safari leader, which pays $45,000/yr. After careful deliberation, Smith took the safari job, but it was a close call. For a dollar more, he said, Id have gone the other way. Now Smiths brother-in-law approaches him with a business proposition. The terms are as follows: How did the process by which Malcom learned to read differ from the typical way people learn to read PLEASE HELP WITH THIS ONE QUESTION ( i will give branly toi the best and the fastest so please help :D extra points as well According to the journal entry, which is an accurate statement?A journal entry from 1775. It reads, 'I was awakened around one in the morning on the 19th of April by a loud bell and shouting. I knew what this meant: British troops were on their way! I quickly got dressed and grabbed my gun. I joined other members of my militia in Lexington to await the redcoats. We lined up close to the road and waited. At dawn, we saw the redcoats marching towards us. There were hundreds of them. I was nervous. I'd never shot at anyone before and knew that it might come to this if the troops kept moving forward. One of them shouted at us to go home and they started angrily moving towards us. Our company started to scatter, to take cover behind trees and fences. I was not sure what the British troops would do next! There were so many of them, and so few of us. The redcoats continued to move towards us and began shooting at us! From behind a tree, I started shooting back. My heart was racing. I couldn't believe that the British soldiers would actually fire on us. We are just farmers and townsmen defending our freedoms, defending ourselves against this aggression. The colonial militia were cowards. The British troops were reluctant to fight. The colonial militia was formally trained. The British troops were well-disciplined. Over the past year you earned a nominal rate of interest of 10% on your money. The inflation rate was 5% over the same period. The EXACT (not approximate) actual growth rate of your purchasing power was 4. a. 0b. 4.8%. c. 5.0%. d. 10.0%. e. None of the above is correct Frederick Douglass is an important figure in the abolitionist movement. "Self-Made Men" is one of the author's most famous speeches.How does this speech examine the idea of what it means to be a self-made person? Which layer of soil is most likely of greatest importance to plant growth? a. o (organic matter) b. a (topsoil) c. b (subsoil) d. c (parent rock)please select the best answer from the choices provided a b c d Burgers cost $4 each and fries cost $2 each.Write an equation that represents the total cost, 'T', of 'B', burgers and 'F', fries.