answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
2 years ago
6

In two to three sentences, describe how you would move a file.

Computers and Technology
1 answer:
Ksivusya [100]2 years ago
6 0
First you locate the file you want to move. Then you can click and drag the file to the desired location.
hope this helped
You might be interested in
7.8.1: Function pass by reference: Transforming coordinates. Define a function CoordTransform() that transforms the function's f
Lilit [14]

Answer:

Here is the CoordTransform() function:              

void CoordTransform(int xVal, int yVal, int &xValNew, int &yValNew){

xValNew = (xVal + 1) * 2;

yValNew = (yVal + 1) * 2; }

The above method has four parameters xVal  and yVal that are used as input parameters and xValNew yValNew as output parameters. This function returns void and transforms its first two input parameters xVal and yVal into two output parameters xValNew and yValNew according to the formula: new = (old + 1) *

Here new variables are xValNew  and yValNew and old is represented by xVal and yVal.

Here the variables xValNew and yValNew are passed by reference which means any change made to these variables will be reflected in main(). Whereas variables xVal and yVal are passed by value.

Explanation:

Here is the complete program:

#include <iostream>

using namespace std;

void CoordTransform(int xVal, int yVal, int &xValNew, int &yValNew){

xValNew = (xVal + 1) * 2;

yValNew = (yVal + 1) * 2;}

int main()

{ int xValNew;

int yValNew;

int xValUser;

int yValUser;

cin >> xValUser;

cin >> yValUser;

CoordTransform(xValUser, yValUser, xValNew, yValNew);

cout << "(" << xValUser << ", " << yValUser << ") becomes (" << xValNew << ", " << yValNew << ")" << endl;

return 0; }

The output is given in the attached screenshot   

7 0
2 years ago
Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
EleoNora [17]

Answer:

a) Power saving = 26.7%

b) power saving = 48%

c) Power saving = 61%

d) Power saving = 25.3%

Explanation:

3 0
2 years ago
Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
3241004551 [841]

Answer:

D. Applying strong encryption

Explanation:

Strong cryptography or cryptographic-ally strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis.One cryptographic cipher has been mathematically proven to be unbreakable when it is used correctly, but it is only very rarely used.

6 0
2 years ago
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon
Andru [333]

Answer:

d. Disable the account until the employee is ready to use it.

Explanation:

Inactive accounts usually presents vulnerability as they are readily compromised and act as targets for attacks by hackers or aggrieved ex-employees that were fired. Such accounts can be used to attack the system without anyone knowing or reporting suspected foul play since there's no one attached.

Since the user will be using the account in two weeks the best practice will be to disable the account until the employee is ready to use it.

8 0
2 years ago
Read 2 more answers
Consider a modification of the rod-cutting problem in which, in addition to a price pi for each rod, each cut incurs a fixed cos
andre [41]

Answer:

Check the explanation

Explanation:

We muddy pseudo code for BOTTOM-UP-CUT-ROD by simply adding —c inside the parenthesis you have in line 6 (because that is were cut is made),

so that now it reads like this:

                                 q=max(q,p[i]+r[j-i]-c)

the after results will look like:

                           Modify pseudo code for BOTTOM-UP-CUT-ROD

6 0
2 years ago
Other questions:
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • Jimmy is preparing a slide show to teach the grade three students the importance of cleanliness. which element should he use in
    5·2 answers
  • A(n) ______of the audio or video clip makes the content easily accessible to people with hearing disabilities.
    10·2 answers
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • You have several pictures of different sizes that you would like to frame.A local picture framing store offers two types of fram
    15·1 answer
  • #Remember that Fibonacci's sequence is a sequence of numbers
    14·1 answer
  • Emulated drivers provide enhanced drivers for the guest OS and improve performance and functionality for IDE and SCSI storage de
    12·1 answer
  • Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu
    13·1 answer
  • Using virtualization comes with many advantages, one of them being performance. Which of these is NOT another realistic advantag
    7·1 answer
  • What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!