in windows explorer,a computers drives are listed in the what

Answers

Answer 1

Answer:

"This PC"

Explanation:

Disk drives (both fixed as well as removable drives) appear under the “This PC” category in File Explorer navigation pane. In addition, each removable drive will be pinned as a separate category, appearing after “This PC” and “Libraries” section — that is, the drives appear twice in the navigation pane.

Answer 2
Task Pane maybe?
I looked it up on google and this is what I got; I hope this helps :)

Related Questions

Which system board has a 64-bit bus?

Answers

Answer:  https://en.wikipedia.org/wiki/64-bit_computing

64-bit computing - Wikipediaen.wikipedia.org › wiki › 64-bit_computing

In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits (8 octets) wide. Also, 64-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those that are based on processor registers, address buses, or data buses of that size. ... With no further qualification, a 64-bit computer architecture ...

‎History · ‎64-bit operating system... · ‎64-bit applications · ‎64-bit data models

Explanation:

convert 1/32 GB into MB​

Answers

Answer:

31.25 megabytes.

31.25 megabytes

Maze must establish a communication channel between two data centers. After conducting a study, she came up with the idea of establishing a wired connection between them since they have to communicate in unencrypted form. Considering the security requirements, Maze proposed using an alarmed carrier PDS over a hardened carrier PDS. Why would Maze make this suggestion in her proposal

Answers

Maze makes this suggestion in her proposal because the alarmed carrier PDS is because it offers continuous monitoring and less periodic visual inspections.

What is Protected distribution system?

This is a carrier system which is used in communication network environment for detection of the presence of a physical intruder.

The alarmed carrier PDS is preferably used as a result of it offering high level of security without periodic visual inspections.

Read more about Protected distribution system here https://brainly.com/question/10619436

Excel

Please explain why we use charts and what charts help us to identify.
Please explain why it is important to select the correct data when creating a chart.

Answers

1) We use chart for Visual representation, Data analysis, Effective communication and Decision-making.

2. It is important to select the correct data when creating a chart Accuracy, Credibility, Clarity and Relevance.

Why is necessary to select the correct data in chart creation?

Accuracy: Selecting the right data ensures that the chart accurately represents the information you want to convey. Incorrect data can lead to misleading or incorrect conclusions.

Relevance: Choosing the appropriate data ensures that your chart focuses on the relevant variables and relationships, making it more useful for analysis and decision-making.

Clarity: Including unnecessary or irrelevant data can clutter the chart and make it difficult to interpret. Selecting the correct data helps to maintain clarity and simplicity in the chart's presentation.

Credibility: Using accurate and relevant data in your charts helps to establish credibility and trust with your audience, as it demonstrates a thorough understanding of the subject matter and attention to detail.

Find more exercises related to charts;

https://brainly.com/question/26501836

#SPJ1

Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.

Answers

Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.

Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?

Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.

What are the three activities that Azure Active Directory Azure AD identity protection can be used for?

Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

Dan wants to use some of his friend's printed photos of sea creatures for a school multimedia project. Which input device is best for transferring the photos to his project?
ОА
web camera
OB.
scanner
OC graphics tablet
OD
digital camera

Answers

Dan wants to transfer printed photos of sea creatures to his school multimedia project. Using a scanner, he can create a digital image of the printed photos and then import them into his project. The correct answer is B. scanner.

What is scanner ?

A scanner is an input device that creates a digital image of a physical document or image.

Therefore, Scanners are widely used in businesses, homes, and institutions for a variety of purposes, such as scanning documents for archiving, creating digital copies of physical documents and converting printed photos into digital images.

Learn more about scanner here : brainly.com/question/14259590

#SPJ1

Problem: Longest Palindromic Substring (Special Characters Allowed)

Write a Python program that finds the longest palindromic substring in a given string, which can contain special characters and spaces. A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward. The program should find and return the longest palindromic substring from the input string, considering special characters and spaces as part of the palindrome. You do not need a "words.csv" as it should use dynamic programming to find the longest palindromic substring within that string.

For example, given the string "babad!b", the program should return "babad!b" as the longest palindromic substring. For the string "c bb d", the program should return " bb " as the longest palindromic substring.

Requirements:

Your program should take a string as input.
Your program should find and return the longest palindromic substring in the input string, considering special characters and spaces as part of the palindrome.
If there are multiple palindromic substrings with the same maximum length, your program should return any one of them.
Your program should be case-sensitive, meaning that "A" and "a" are considered different characters.
You should implement a function called longest_palindrome(string) that takes the input string and returns the longest palindromic substring.
Hint: You can use dynamic programming to solve this problem. Consider a 2D table where each cell (i, j) represents whether the substring from index i to j is a palindrome or not.

Note: This problem requires careful consideration of edge cases and efficient algorithm design. Take your time to think through the solution and test it with various input strings.

Answers

A Python program that finds the longest palindromic substring in a given string, considering special characters and spaces as part of the palindrome is given below.

Code:

def longest_palindrome(string):

   n = len(string)

   table = [[False] * n for _ in range(n)]

   # All substrings of length 1 are palindromes

   for i in range(n):

       table[i][i] = True

   start = 0

   max_length = 1

   # Check for substrings of length 2

   for i in range(n - 1):

       if string[i] == string[i + 1]:

           table[i][i + 1] = True

           start = i

           max_length = 2

   # Check for substrings of length greater than 2

   for length in range(3, n + 1):

       for i in range(n - length + 1):

           j = i + length - 1

           if string[i] == string[j] and table[i + 1][j - 1]:

               table[i][j] = True

               start = i

               max_length = length

   return string[start:start + max_length]

# Example usage

input_string = "babad!b"

result = longest_palindrome(input_string)

print(result)

This program defines the longest_palindrome function that takes an input string and uses a dynamic programming approach to find the longest palindromic substring within that string.

The program creates a 2D table to store whether a substring is a palindrome or not. It starts by marking all substrings of length 1 as palindromes and then checks for substrings of length 2.

Finally, it iterates over substrings of length greater than 2, updating the table accordingly.

The program keeps track of the start index and maximum length of the palindromic substring found so far.

After processing all substrings, it returns the longest palindromic substring using the start index and maximum length.

For more questions on Python program

https://brainly.com/question/30113981

#SPJ8

_______ are the best visual aids for showing the relationship between ideas in a presentation.

Answers

Answer:

A graphic organizers

Explanation:

Graphic users are the best visual aids for showing the relationship between ideas in a presentation.

What are Graphic user?

By the use of menus, icons, and other visual cues or representations, a user interacts with electronic devices like computers and smartphones using a graphical user interface (GUI) (graphics).

Unlike text-based interfaces, where data and commands are purely in text, GUIs graphically show information and related user controls. A pointing device, such as a mouse, trackball, stylus, or a finger on a touch screen, is used to manipulate GUI representations.

The first keyboard input and prompt system was used for the human-computer text interaction (or DOS prompt). At the DOS prompt, commands were entered to request responses from a computer.

Therefore, Graphic users are the best visual aids for showing the relationship between ideas in a presentation.

To learn more about Graphic user, refer to the link:

https://brainly.com/question/14758410

#SPJ6

Does your computer smartphones help you on your studies or is it considered as a distraction?; Are computers a distraction in the classroom?

Answers

There is little doubt that using smartphones and other devices in the classroom can distract pupils, but recent research indicates that doing so may even result in worse marks. For some students, this grade could mean the difference between passing and failing.

In a classroom, are computers a distraction?

The consequences of utilizing a laptop in class have been proven to be inconsistent. Professors who do forbid laptop use cite studies demonstrating that handwritten notes are more efficient than those taken on computers. However, other research indicates that there is almost any difference in learning while taking notes by hand versus using a laptop.

Intellectual distraction is the inability of a user to process two or more different forms of data at once (David et al., 2015). A loss in energy and attention may be brought on by phone calls, texts, and social media networking sites.

To know more about social media click here

brainly.com/question/29036499

#SPJ4

In C,
Write a statement that declares a prototype for a function printErrorDescription , which has one int parameter and returns nothing.
Write a statement that declares a prototype for a function add which has two int parameters and returns an int .

Answers

In C, a function prototype is used to declare the function before it is defined. This allows the compiler to know the function's name, return type, and parameters before the function is actually used in the program.


To declare a prototype for a function `printErrorDescription` which has one int parameter and returns nothing, you can use the following statement:
```
void printErrorDescription(int);
```
The `void` return type indicates that the function does not return anything. The `int` parameter indicates that the function takes one integer parameter.

Similarly, to declare a prototype for a function `add` which has two int parameters and returns an int, you can use the following statement:
```
int add(int, int);
```
The `int` return type indicates that the function returns an integer value. The two `int` parameters indicate that the function takes two integer parameters.

In both cases, the function name is followed by a list of parameters enclosed in parentheses. Each parameter is specified with a type followed by an optional name. The function's return type is specified before the function name.

Learn more about function here:

brainly.com/question/15741511

#SPJ11

In C,Write a statement that declares a prototype for a function printErrorDescription , which has one

1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?

Answers

The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.

Some characteristics of OS are provided below:

Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.

Type of OS:

Distributed OS.Time-sharing OS.Batch OS.

Learn more about the operating system here:

https://brainly.com/question/2126669

1. What characteristics are common among operating systems? List types of operating systems, andexamples

Anna bought a box of blueberries for £7. She used 700 grams for a cheesecake and she has 450 grams left. How much did the blueberries cost per 100 grams?

Answers

0.61 (rounded up)

Explanation:

You add both 700 and 450 which will give you 1150g

You then divide 1150 by 100 which gives you 11.5

Then divide 7 by 11.5 which will give you 0.61 as cost of every 100 grams

"using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer."

Answers

The use of the broadband type of communications channel is one where several users can simultaneously use a single connection for high-speed data transfer.

What is wireless medium?

In wireless transmission, the tool that is often used is the air, is via electromagnetic, radio and microwave signals.

What does broadband mean?

The term Broadband is known to be the sharing or the transmission of wide bandwidth data in course of a high speed internet connection.

Note also that broadband internet is the lowest of 25 Mbps download and that of 3 Mbps upload speeds.

Hence, The use of the broadband type of communications channel is one where several users can simultaneously use a single connection for high-speed data transfer.

Learn more about communications from

https://brainly.com/question/26152499

#SPJ1

What are 3 key factors in defining cost on cloud storage

Answers

i'm not sure sorry

I hope someone else can help you with this question

evaluate the logical expression of the following, given a= 2 , b=3, c=5.
1. (a>b) || (c==5)
2.(a<b) && (b<c)​

Answers

Answer:

1. True

2. True

Explanation:

What free website can you record videos on, and edit them without money?

Answers

Answer:

You can edit videos on Capcut for free and I think you can also use Alightmoon

Answer:

You can edit videos using this application called Kinemaster.

Explanation:

After recording the video download Kinemaster available on Playstore and App store

What is the next line? >>> tupleB = (5, 7, 5, 7, 2, 7) >>> tupleB.count(7) 3 1 2 0

Answers

Answer:

3 is the next line.

Explanation:

.count literally counts how many something is. so, .cout(7) counts how many 7 there is. you can see that there are 3 number 7s.

What is the next line? &gt;&gt;&gt; tupleB = (5, 7, 5, 7, 2, 7) &gt;&gt;&gt; tupleB.count(7) 3 1 2 0

What is a common method used in social engineering?

Answers

Explanation:

they are phishing, pretexting, baiting, quid pro quo and tailgating.

write a recirsive function named productsof odds that accepts a tuple

Answers

Answer:

def productOfOdds(t):

   if len(t) == 1:

       if t[0] % 2 == 1:

           return t[0]

       else:

           return 1

   else:

       if t[0] % 2 == 1:

           return t[0] * productOfOdds(t[1:])

       else:

           return productOfOdds(t[1:])

t = (1, 2, 3, 4, 5, 6, 7, 8, 9)

print("Product of odd elements:", productOfOdds(t)

Describe the impact of a company’s culture on its success in a customer-focused business environment. Discuss why each is important.

Answers

The influence of a corporation's  culture cannot be underestimated when it comes to achieving success in a customer-centric commercial landscape.


What is company’s culture

The values, beliefs, norms, and behaviors that constitute a company's culture have a major impact on how its employees engage with customers and prioritize their requirements.

Having a customer-centric mindset means cultivating a culture that places a strong emphasis on satisfying and prioritizing customers' needs and desires, resulting in employees who are aware of the critical role customer satisfaction plays in ensuring success.

Learn more about company’s culture from

https://brainly.com/question/16049983

#SPJ1

what is meant by the purpose of the flashcards software application is to encourage students to condense difficult topics into simple flashcards to understand the key ideas in programming courses better

Answers

The purpose of a flashcards software application in the context of programming courses is to provide students with a tool that encourages them to condense complex and challenging topics into simplified flashcards.

These flashcards serve as a means for students to understand and internalize the key ideas and concepts in programming more effectively.

By condensing the material into concise flashcards, students are required to identify the most important information, grasp the core concepts, and articulate them in a clear and simplified manner.

The software application aims to foster active learning and engagement by prompting students to actively participate in the process of creating flashcards.

This process encourages critical thinking, as students need to analyze, synthesize, and summarize the material in a way that is easily digestible. Additionally, the act of reviewing these flashcards on a regular basis helps students reinforce their understanding, retain information, and improve their overall comprehension of programming topics.

Importantly, the focus on condensing difficult topics into simple flashcards helps students break down complex information into manageable, bite-sized pieces.

This approach enables them to tackle challenging programming concepts incrementally, enhancing their ability to grasp and apply the fundamental ideas effectively.

For more such questions on flashcards,click on

https://brainly.com/question/1169583

#SPJ8

What happens when two users attempt to edit a shared presentation in the cloud simultaneously? The second user is unable to open the presentation. When the second user logs on, the first user is locked out. A presentation cannot be shared in the cloud for this reason. A warning notice will alert the users that the presentation is in use.

Answers

Answer:

a warning notice will alert the users that the presentation is in use

Explanation:

I did it on edge

Answer:

D; A warning notice will alert the users that the presentation is in use.

Explanation:

Edge

Zuzana is creating a report for her supervisor about the cost savings associated with cloud computing. Which of the following would she NOT include on her report on the cost savings?
a. Reduction in broadband costs
b. Resiliency
c. Scalability
d. Pay-per-use

Answers

In this question, the answer is  "Resiliency".

It is crucial because it gives people the strength to deal with and overcome difficulties.These people lack resilience and can readily overcome dysfunctional techniques of control. Robust people draw on their strengths and processes to solve difficulties and deal with problems.In contrast, scalability increases cost savings with alternatives such as vertical and horizontal scaling. Costs saved also include reducing the cost of broadband and pay peruse.

Therefore, the answer is "Resiliency" because it involves services which is the cost of the money.  

Learn more:

brainly.com/question/9082230

Can someone please tell me how to do this step by step?

ASAP

Can someone please tell me how to do this step by step?ASAP

Answers

The steps that are required to customize elements of a Word document and its formatting to be consistent with other magazine articles are listed below.

How to customize elements and format a document?

In Microsoft Word 2019, the steps that are required to customize elements of a Word document and its formatting to be consistent with other magazine articles include the following:

You should apply a style set.You should change the color of an underline.You should use the Thesaurus.You should change the character spacing, change the font color and update a style.You should apply a character style.You should change the font case.You should insert a Quick Part.You should insert a table of contents.You should change the table of content (TOC) level.You should apply a style.You should update the table of contents.

In conclusion, the end user should update the table of contents as the last step, so as to reflect the change to his or her Word document.

Read more on Microsoft Word here: https://brainly.com/question/25813601

#SPJ1

Complete Question:

As the owner of On Board, a small business that provides orientation services to international students, you are writing an article about starting a business that will be published in an online magazine for recent college graduates. You need to customize elements of the document and its formatting to be consistent with other magazine articles. What are the steps?

4) Computer viruses can be spread by
sharing flash drives.
O downloading and running a file attached to an email.
O downloading a song from a peer-to-peer sharing site.
O all of the above

Answers

Answer:

All of the above

Explanation:

Flash drives may be stored with viruses, A file from an email might not be reputable, and Peer to Peer sights are risky and a virus can be disguised as a song. This proves that the answer is all of the above.

parameters and return make

Answers

Answer:

I don't understand this question

Who is responsible for having Account/Relationship level Business Continuity Plan (BCP) in place?
Select only one answer.
Admin manager
Relationship/Account Crisis Management Leader (CML)
Information Security Coordinator (ISC)
Chief Security Officer (CSO)
SUBMIT

Answers

Business Continuity Plan (BCP) implementation at the Account/Relationship level is the responsibility of the Relationship/Account Crisis Management Leader (CML).

Who should be in charge of BCP?

Under the direction of the programme manager, business unit leaders (such as those in charge of payroll, company travel, physical security, information security, and HR) are in charge of developing their unit's business continuity plan.

Which of the following best describes an organization's BCP structure, according to TCS Mcq?

Reason for the response: Business continuity planning (BCP) is the procedure used to develop a system of protection against possible threats to a business and recovery from those threats. In the event of a disaster, the strategy makes sure that people and property are safeguarded and can operate quickly.

To know more about BCP visit:

https://brainly.com/question/28964695

#SPJ9

define artificial intelligence?​

Answers

Answer:

the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

Explanation:

hope this helps!! have a great day!! :D

Answer:

the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

PLEASEEE HELP
Where could page numbers appear in a properly formatted business document?
A. In document titles
B. In headers or footers
c. In headers only
D. In footers only​

Answers

In the headers or footers

Answer: b

Explanation:

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.

Answers

Answer:

Flowchart.

Explanation:

Structured Systems Analysis and Design (SSAD) is a methodology and a systems technique of analyzing and designing of information systems.

This system uses several tools to design various components such as dataflow diagram, conceptual data model, flowchart, etc.

In the given scenario, the tool that will be used by the system would be a flowchart.

A flowchart is a diagram that represents a systematic flow of a process. In SSAD, flowchart is used to illustrate the logical steps to be taken in a process but it does not show data elements and associations.

So, the correct answer is flowchart.

Other Questions
what is the impact of ownership and management on the noneeconomic objective of state owned company ? Complete the exponent rule. Assume x 0.xn = If you are given the equation below, what operation would you need to use tosolve for x? 20 = 5x Noah has a mask collection of 40 masks. He keeps some in a display case and the rest on the wall. He keeps 15% of his masks in the display case. How many masks does he keep on his wall? Determine the inverse of Laplace Transform of the following function. F(s)=- 3s/ (s+2) (s-4) Can someone help me out on this? What is the term for the distance around the edge of the penny A restaurant customer left $0.70 as a tip. The tax was 4% and the tip was 10% of the cost including tax. $4.50 for three hotdogs M1 and M2 are two definitions of the money supply. Determine whether the items listed are included in the money supply under each of these definitions.a. Common stock is part of _______________.b. Money market account balances are part of _______________.c. Balances in savings accounts are part of _______________.d. Balances on checking accounts are part of _______________.e. Certificates of deposit are part of _______________.f. Currency is part of _______________.g. Credit cards are part of _______________. h. Gold is part of _______________.WORD BANK:- M1 only.- both M1 and M2.- M2 only.- neither M1 or M2. solve the system of equations using substitution the ap exam uses the following relational (comparison) operators: =, , >, Which of the following can be useful when finding the value of a variable check all that applyA. Drawing a diagramB. Drawing a graphC. Reading a tableD. Writing an equation When an increase in the firm's output reduces its long-run average total cost, it achieves:a. economies of scale.b. diseconomies of scale.c. constant returns to scale.d. variable returns to scale. The magnetic field at the center of a circular path in the plane of the paper produced by a proton rotating counterclockwise points to:a. to the pageb. leaving the pagec. toward the leftd. to the What is 2/3-1/2 mathswatch Write a letter to a younger student explaining why they should not drink alcohol before the legal age. Anyone please help I dont know what to do What were the members of the Sons of Liberty called in Georgia and what was the name of the Tavern where they met in Savannah ? which of the following is true about the behavioral approach to assessment? group of answer choices it seeks to identify traits or motives that can be inferred from behavior. it seeks to reveal underlying motivations regarding personality. it focuses on what a person actually does in certain situations. it focuses primarily on what a person actually thinks while engaging in specific behaviors.