You downloaded a file using internet explorer. unfortunately, you closed ie and you don’t remember where you downloaded the file to. how can you find the file?

Answers

Answer 1
Hit Ctrl+J and the file should be there on the top of the list

Related Questions

In addition to narrative form, experimental or avant-garde films may use ______ or ______ form.

Answers

In addition to narrative form, experimental or avant-garde films may use Abstract or Associational form.

The abstract form organizes entire films around shapes, sizes, colors and movements in the images. Abstract films can seen completely random. And associational form in which the films parts are exposed to suggest similarities, contrast, concept, emotions and express qualities.

Operating systems are interchangeable and are installed to any computer after the purchase according to your customized preference.
a. True
b. False

Answers

Operating systems are interchangeable and are installed to any computer after the purchase according to your customized preference. 
a. True 
b. False

Explanation: iOS (MAC') run only on Apple Hardware, Windows will not run on a Chome OS, Mainframe OS's like VSE, VM, TPF only run on IBM Mainframes etc.

• what command-line utility can you use to assign the correct dns server ip address

Answers

On A Windows machine, you can use the netsh command.
netsh interface ip set dns name="Local Area Connection" static 208.67.222.222

All the steps below means you have access to the router via Telnet or physical access  and it already has a valid configuration (except the DNS)
On a Cisco Router is:
Step 1:  enable 
Step 2: configure terminal 
Step 3: Do one of the following: ip domain name name
                                                       ip domain list name
Step 4 : Device(config)# ip name-server 172.16.1.111 172.16.1.2

The dfs replication engine uses a form of replication called

Answers

The DFS replication engine uses a form of replication called multiple master replication

An object is ____ that can be treated as an individual unit or component.

Answers

If my memory serves me well, an object is the programming code and data that can be treated as an individual unit or component. There can be more than one units and every unit is responsible for particular function in the program. Unit stores methods, operators or operands that run the program.

The basic technological foundations of the internet?

Answers

The internet is different from the world wide web, currently you are using the world wide web  (WWW) the internet is what connects you to the WWW and allows you to use it. The internet was created thanks to the concept of e-mail and other forms of e communication. The idea that information could be transferred wirelessly began the idea of a centralized communication network (basically the internets dad). Originally the internet wasn't designed to host websites or domains, it was designed for communication and data transfer. Over time this morphed into GUI's (graphic user interface) in order to simplify the process (and to make it look nicer).  

The internet's growth relied on key technological developments like TCP/IP, the World Wide Web, and the Mosaic browser. These innovations made the Internet accessible and user-friendly, leading to its widespread use.


DARPA's packet-switching and advancements in digital infrastructure were also crucial.

The Internet, a network of networks, has its roots in several key technological developments that significantly contributed to its spread, known as the "democratization" of the Internet. This began with the creation of the protocol TCP/IP by Vinton Cerf and Bob Kahn in 1974, which allowed diverse computer networks to communicate.

In 1983, the Internet, initially a network for research centres and universities, began to expand. The first major boost came in 1990 with Tim Berners-Lee's invention of the World Wide Web, which made it easier to access and share information.

The second significant boost was in 1993 with the release of the first browser, Mosaic, which made navigating the web user-friendly and visually engaging, contributing to the rapid spread of internet usage from 1994 onwards.

Other critical developments included DARPA’s research on packet-switching technology in 1973, which enabled reliable data transmission over distributed networks, and the creation of digital infrastructures like microprocessors and fibre-optic cables around 1990. These breakthroughs made the efficient transfer of digital information across vast distances possible.

What device can boost an analog signal? a digital signal?

Answers

Analog = amplifier
Digital = repeater

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Answers

Answer: An evil twin attack poses as a legitimate AP.

The network services and facilities that users interact with are provided by

Answers

The network services and facilities that users interact with are provided by authentication.

True or False: Wikipedia pages should get high ratings for all user intents because information is always helpful.

Answers

I would say true but it's just a guess.

Answer:

The statement is true. Wikipedia is today the main tool for collecting information for students, workers and even academics around the world, as it provides fast, accessible, verifiable and free information to everyone.  Therefore, its pages should get high ratings, as they are helpful for all people.

While the information is verifiable, it should be noted that any Wikipedia user can modify their articles, which are subsequently moderated by specialists. But even so, there is a risk that some data may be wrong, so it is necessary for the readers to control the information obtained. Therefore, a good option would be a system of ranking information and qualifying answers, so that other users know the experience of other students regarding the information provided.

Marie uses a browser to visit a blog. What is the unique identifier of the blog?

Answers

it would be the Website which contains the URL of the blog
the website.............

For each processor find the average capacitive loads.

Answers

For each processor find the average capacitive loads. Answer use Pefrmon and select CPU Tab (see attachment).

Modify secondverse to play "the name game" (a.k.a. "the banana song", see wikipedia.org), by replacing "(name)" with username but without the first letter. ex: if username = "katie", the program prints:

Answers

I guess you need to write it using C++, so here's your solution:
int main() {   string secondVerse = "Banana-fana fo-f(Name)!";   string userName = "Kattie";
   userName.erase(userName.begin());
userName.resize(userName.length()); secondVerse = secondVerse.replace(secondVerse.find("(Name)"),6 ,userName);
cout << secondVerse << endl;

 return 0;
}

 "userName.erase(userName.begin());" - this one removes first letter of the name.

A(n) ________ is a light-sensitive material used to make a chip.

Answers

The photoresist is a light-sensitive material used to make a chip. Photoresists can likewise be uncovered by electron shafts, creating an indistinguishable outcomes from introduction by light. The primary distinction is that while photons are consumed, storing all their vitality without a moment's delay, electrons store their vitality bit by bit, and scramble inside the photoresist amid this procedure.

Describe a modification of dijkstra's algorithm that runs as fast as the original algorithm, and assigns a label usp[u] to every vertex u in g

Answers

the words brave and courageous are example of

Emily wants to purchase a tablet device. she is unsure about what hardware and apps she will need. as a result, she has begun asking for advice from her friends and relatives. in addition, she has talked to several salespeople at apple and best buy and has looked at some websites, such as hp and dell. emily is engaging in

Answers

Please make your question clear

A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whenever the local host makes a request to access the internet

Answers

Dynamic Network Address Translation (DNAT)

Glass, rubber, porcelain, and paper are examples of electrical A. conductors. B. insulators. C. grounds. D. batteries.

Answers

B.Insulators I think
The correct answer here is B. Insulators because an insulator is a material that does not conduct electricity well. The examples here are perfect examples of insulators.

What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?

Answers

On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.
Final answer:

The development of open source operating systems like Linux disrupted traditional economic models in the high-tech industry by fostering collaboration, reducing software costs, and lowering the barrier to entry for tech startups.

Explanation:

The advent of open source operating systems like Linux had a significant impact on the economics of high-tech industry. Unlike the proprietary software models of the past where companies like IBM and Microsoft dominated the market with their operating systems, open source presented a dramatically different economic model. The open source ethos encouraged collaboration, sharing, and modification, leading to heightened innovation and sharply reducing costs for both users and developers.

Previously, operating systems like UNIX began as more open but became heavily commercialized, leading to costly proprietary versions tied to specific hardware, such as IBM's AIX or Sun Microsystems' Solaris. This changed with Linux, initiated by Linus Torvalds, predicated on the idea that software should be freely available to anyone to use, modify, and distribute.

The rise of Linux and other open source software disrupted the traditional economic models, making it less necessary for companies to allocate substantial budgets to purchase software licenses. Developers could now build upon existing open-source platforms without worrying about licensing fees, reducing the barrier to entry for tech startups and encouraging a more inclusive and decentralized tech landscape.

When troubleshooting vpn connectivity, which windows and linux command can you use to verify your internal port?
a.ping
b.traceroute
c.lookup
d.ipconfig?

Answers

The answer is ping = A; 

The acronym is used to define the process that allows multiple devices to share a single routable ip address.

Answers

The answer is Mac Address
media access control address 

What name is given to random characters that you can combine with an actual input key to create the encryption key?

Answers

Salt value is the name given to random characters that you can combine with an actual input key to create the encryption key. Salt is a random string of data used to modify a password hash. When you add salt to a password hash the attacker is prevented form testing known dictionary words across the entire system. The longer tha salt value the better the protection.

To create a button that will allow a user to send the form data to the server you use a type of ____

Answers

Submit command, as it hands in the data to the server

The ________ is one of a number of major internet interconnection points that serve to tie all the isps together.

Answers

The Internet Exchange Point (IXP) is one of a number of major internet interconnection points that serve to tie all the ISPs (Internet Service Providers) together. This point is a physical infrastructure that allows ISPs to interconnect via several paths. Having more paths improves routing efficiency. 

________ data becomes part of your destination file and remains static even if the source data changes.
A. Embedded
B. Field
C. Integrated
D. Linked

Answers

The correct option is A that  is Embedded data.
Embedded data becomes part of your destination file and remains static even if the source data changes.
When you embedded an object, it becomes the part of destination document. when you embedded an excel worksheet in to word document, if you make changes to the excel worksheet it did not make any changes to the destination document. so when you edit the excel worksheet from the word document, you will use the editing features of excel.
It means if you embedded an excel worksheet into word document, excel worksheet remains excel worksheet.

A(n) ____ loop executes a predetermined number of times.

Answers

Final answer:

A count-controlled loop, often referred to as a for loop, executes a predetermined number of times and follows the same path for every cycle.

Explanation:

A count-controlled loop executes a predetermined number of times. This type of loop is commonly referred to as a for loop in many programming languages. It follows a predetermined path for every cycle, contrasting a process in which the system may follow a different path for every cycle.

When designing loops within a program, it is crucial to ensure there are enough iterations to cover the necessary components without redundancy. Similar to choosing loops in a circuit where each component should be covered exactly once, in programming, you would also aim to reduce unnecessary repetition.

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Answers

The best answer is A, viruses.

Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the following statements about these symbols is correct?

A. Symbol 1 represents a diode, symbol 2 represents a resistor, symbol 3 represents an LED, and symbol 4 represents a transistor.
B. Symbol 1 represents a diode, symbol 2 represents an LED, symbol 3 represents a transistor, and symbol 4 represents a resistor.
C. Symbol 1 represents a transistor, symbol 2 represents a resistor, symbol 3 represents an LED, and symbol 4 represents a diode.
D. Symbol 1 represents a transistor, symbol 2 represents a diode, symbol 3 represents a resistor, and symbol 4 represents an LED.

Answers

The 1st one is a BJT(Bipolar Junction Transistor), which is indeed a transistor.

The 2nd one is a diode.

The 3rd is a resistor.

The 4th is an optic switch, which can be a LED switch.
Final answer:

Without the provided figure, it is not possible to correctly identify which schematic symbol represents a diode, resistor, LED, or transistor. However, standard symbols for these components can be used to identify them in circuit diagrams, with a diode shown as a triangle pointing at a line, a resistor as a zigzag line, an LED like a diode but with lines for light emission, and a transistor symbol varying based on type but having three leads.

Explanation:

To answer the question regarding the schematic symbols labeled with numbers, without the actual figure to refer to, it is impossible to definitively identify which symbol represents which electronic component. However, using the descriptions commonly associated with electronic components and schematic diagrams, we can provide general information that may help in identifying these symbols correctly in the future.

A diode is represented by a symbol that consists of a triangle pointing towards a line, which represents the direction of conventional current flow (from positive to negative). A resistor is usually depicted as a zigzag line. An LED, or light-emitting diode, is shown similarly to a diode symbol but with two small lines representing light emission. Lastly, a transistor can be recognized by a symbol with three leads and may vary in appearance depending on whether it is a bipolar junction transistor (BJT) or a field-effect transistor (FET).

With these descriptions, you would need to match the visual symbols from the figure you have with these standard electronic symbols to determine the correct statement about the symbols labeled 1 to 4.

Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsquare and print out the length of the side of that square. however: if any value read in is not valid input, just print the message "invalid". assume the availability of a variable , stdin, that references a scanner object associated with standard input.

Answers

I can solve it with Java. Here it is: 

areaOfSquare = stdin.nextDouble();
double sqrt = Math.sqrt(areaOfSquare);
if(Double.isNaN(sqrt)){
     System.out.print("INVALID");
} else {
     System.out.print(sqrt);
}

Many of today’s microprocessors perform ____, in which multiple instructions are executed at the same time

Answers

Answer: multiprocessing
Other Questions
The Second Amendment to the U.S. Constitution, which is a frequent source of controversy in public debates, says that "a well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed." The controversy stems from the fact that some Americans feel that the Second Amendment guarantees all citizens the absolute right to own firearms, while others believe that some restrictions on gun ownership are consistent with the Second Amendment. Which of the following sentences best describes the authors message in this passage?A) The Second Amendment addresses the topic of gun control, which is a current issue.B) Americans have found that the Second Amendment can be interpreted in different ways.C) The US Constitution contains many examples of amendments that people debate today.D) There is no need to debate the issue of gun control when the Second Amendment is so clear. 5. Just then, my friend's cell phone rang, and she began ______ through her purse to find it.A. goingB. lookingC. diggingIs it B, Looking? 1.(05.01 LC)The graph below shows the height an elevator travels, y, in x seconds:What is the rate of change for the relationship represented in the graph? (1 point)A. 1/15B.1/14C.14D.15 how did european industrialization set the stage for imperialism in africa? find the point that splits segment cd in half if point c is located at (-2,4) and point d is located at (3,7) The sum of 5 consecutive even number is 100 the middle number is Is the movie the accountant based on a book? Solve the triangle. A = 54, b = 11, c = 8options: No triangles possible a 13.4, C 49.6, B 76.4 a 13.4, C 45.6, B 80.4 a 9, C 45.6, B 80.4 Is the decimal form of 13/3 a rational number writers who exposed the ills of society and pushed for reform were known as Can someone help me please? I don't know how to do this problem, could someone explain step by step? It would be greatly appreciated. I've also included 15 points to whoever answers this. One 16-ounce bottle of an energy drink has an average of 500 mg of caffeine with a standard deviation of 25 mg. In a carton containing 30 bottles, what is the standard deviation of the average amount of caffeine? what is the value of -2 x^2 +4y if x = -2 and y =3 Read the passage and answer the question that follows. from Gulliver's Travels, by Jonathan Swift My gentleness and good behaviour had gained so far on the emperor and his court, and indeed upon the army and people in general, that I began to conceive hopes of getting my liberty in a short time. I took all possible methods to cultivate this favourable disposition. The natives came, by degrees, to be less apprehensive of any danger from me. I would sometimes lie down, and let five or six of them dance on my hand; and at last the boys and girls would venture to come and play at hide-and-seek in my hair. I had now made a good progress in understanding and speaking the language. The emperor had a mind one day to entertain me with several of the country shows, wherein they exceed all nations I have known, both for dexterity and magnificence. I was diverted with none so much as that of the rope-dancers, performed upon a slender white thread, extended about two feet, and twelve inches from the ground. Upon which I shall desire liberty, with the reader's patience, to enlarge a little. Based on the information in this passage, the story's events will most likely focus on (5 points) the characteristics of the society visited by the narrator the narrator's attempts to forcibly break free from the emperor's control the entertainments attended by the narrator over time the narrator's efforts to develop a good relationship with the other characters How many numbers are between 0 and 1/10 Hans's vegetable garden has an area of 400 ft2. It is the shape of a rectangle with a length of 40 ft and a width of 10 ft. He has decided to expand the garden to make room for several new varieties of lettuce. The new garden will be a larger rectangle. He plans on making the new length 3 times the current length and the new width 3 times the current width. In what way did the Christian crusades contribute to the decline of the Byzantine Empire Solve the system by the elimination method 6x+2y=-16 -x-3y=-16 Lowell bought 4 1/4 pounds of apples and 3 3/5 pounds of oranges. How many pounds of fruit did lo buy? Which of the following statements is true?A.) Symptoms of infection indicate that the body has been overtaken by invading microorganisms.B.) Symptoms of infection indicate that the body is trying to combat invading microorganisms.C.) Symptoms of infection indicate that the body has successfully defeated invading microorganisms.D.) Symptoms of infection indicate that the body is unprepared to combat invading microorganisms. Steam Workshop Downloader