list the steps to create a new folder in windows

Answers

Answer 1

Navigate to where you want to create the new folder, and click New Folder. Type the name of your folder, and press Enter. To save a document to the new folder, open the document, and click File > Save As, and then browse to the new folder, and click Save.


Related Questions

write aemail to brother for laptop for vitrual classes​

Answers

Answer:

If I were to ask my brother for a laptop, I would go:

Hey, can I have your laptop? I need it for online classes.

Sincerely, [my name]

Dear brother, I really need a lab top for my online classes (explain why you don’t have one) i would really appreciate it :)

Sincerely,
Your bro/ Sis

Write a program with 2 separate functions which compute the GCD (Greatest Common Denominator) and the LCM (Lowest Common Multiple) of two input integers.

Answers

Answer:

The program written in Python is as follows

def GCD(num1, num2):

    small = num1

    if num1 > num2:

         small = num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

    print("The GCD is "+ str(gcd))

def LCM(num1,num2):

    big = num2  

    if num1 > num2:

         big = num1

    while(True):

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

     print("The LCM is "+ str(lcm))

 print("Enter two numbers: ")

num1 = int(input(": "))

num2 = int(input(": "))

GCD(num1, num2)

LCM(num1, num2)

Explanation:

This line defines the GCD function

def GCD(num1, num2):

This line initializes variable small to num1

    small = num1

This line checks if num2 is less than num1, if yes: num2 is assigned to variable small

    if num1 > num2:

         small = num2

The following iteration determines the GCD of num1 and num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

This line prints the GCD

    print("The GCD is "+ str(gcd))

   

This line defines the LCM function

def LCM(num1,num2):

This line initializes variable big to num2

    big = num2  

This line checks if num1 is greater than num2, if yes: num1 is assigned to variable big

    if num1 > num2:

         big = num1

The following iteration continues while the LCM has not been gotten.

    while(True):

This if statement determines the LCM using modulo operator

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

This line prints the LCM of the two numbers

     print("The LCM is "+ str(lcm))

The main starts here

This line prompts user for two numbers

print("Enter two numbers: ")

The next two lines get user inputs

num1 = int(input(": "))

num2 = int(input(": "))

This calls the GCD function

GCD(num1, num2)

This calls the LCM function

LCM(num1, num2)

See attachment for more structured program

how do you keep word from trying to capitalize every isolated letter "i"

Answers

Write "i" the write random words then delete it and add the lowercase i
Answer: It’s best to write the letter “i” then on the word suggestions, click “i” and repeat it a few times to let the phone register that you only want your individual “i” to be lowercase.

Endnotes are indicated by

A. lowercase letters (a, b, c)

B. numbers (1, 2, 3)

C. Roman numerals (i, il, ill)

D. uppercase letters (A, B, C)
They

Answers

Answer:

The answer is D because u have the uppercase letter bold

Answer:

Endnotes are actually indicated by Roman Numerals so option C is correct.

so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones

Answers

No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution

A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.

Answers

Answer:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Explanation:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

References inserted initially as footnotes can be converted to endnotes through an option in the software.

A. True

B. False

Answers

The answer is A. True

The answer is: A) True

Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​

Answers

Answer:

Hence f(z)=11

*This is what i think*

Computer Architecture
1. Define what a "word" is in computer architecture:
A. The size (number of bits) of the address
B. The total number of bits of an instruction (e.g. 16 bits)
C. Word and width are synonymous.
D. A word is the contents of a memory register.
2. What is the difference between a register’s width and a register’s address? (choose all that apply - there may be more than one correct answer)
A. They are both the same!
B. Address is the same for all registers, width is unique for each register.
C. Width is the amount of data a single register holds, address is the location of the register within a larger chip.
D. The address bits of a register is a logarithm of its width.
3. Which of the following is NOT implemented by the Program Counter?
A. Set the counter to 0.
B. Increase the counter by 1.
C. Decrease the counter by 1.
D. Set the counter to any input value.
4. What is the relationship between the size of the address (number of bits) and the word size for memory registers?
A. address bits = 2^(word size)
B. address bits = word size ^ 2
C. address bits = word size
D. address bits = log2(word size)
E. address bits = (word size) / 2

Answers

Answer:

BADDA

Explanation:

BIIING

describe PROM, EPROM and EEPROM memories​

Answers

Answer:

Explanation:

PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.

Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?

A. counter module

B. while loop

C. for loop

D. mean module

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is A: counter module.

Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.

Other options are not correct because:

While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Answer:

a binary

Explanation:

ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.

Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o

Answers

Answer:

A. Blade

Explanation:

Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.

If this is multiple choice, a dedicated server can be too.

Discuss the advantages and disadvantages of artificial intelligence ?
50word

Answers

Answer:

it'll be in points okay.

Explanation:

1. It's a blessing as well as a curse.

2. It changed lives.

3. Helped understand things better.

4. Development.

5. Free knowledge e.g. Brainly

;)

Explanation:

Kxkxkdkeeksldowowowkscoviforkeooododosowkwmdndmdmrnrnrmrmfododoo ododosososxkxkdldldldllwlwwlel ododoeldl ldldldlxl odododo oodoxxoo

The Mac’s GUI set it apart from earlier operating systems.
True or False

Answers

Answer:

Its true

Explanation:

Just took the test.

What causes them to catch your attention in advertisements?

Answers

Answer:

advertisement should be nice and attractive to get attention of people

What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu

Answers

The Innocents on Hulu i think

Answer:Raising Dion?

Explanation:

Was it Raising Dion?

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

tyafana

Explan

ation:n umbers

No variables and only in one lines

Answers

In python 3.8, we can use a simple print statement.

print(('h0 '*3 +'Merry Christmas\n')*2)

need help asap
Which statement is true of emerging technologies?

Advancements in communication technologies played a minor part in the rise of globalization.
Developments in communication helped remote locations connect with the world.
Malicious entities can misuse emerging technologies.
There are few disadvantages to the widespread growth of the internet.
The complexity of wireless communication prohibits it from being provided in remote locations

Answers

Answer:

Advancements on communication technologies played a minor part in the rise of globalization.

Explanation:

Answer:

Developments in communication helped remote locations connect with the world.

Explanation:

I took the test, plato/edemetuimedemetuim

We can create tables in MS. Word from *
2 points
Insert Tab
Home Tab
Mailings Tab

Answers

Answer:

insert tab

Explanation:

hope it helps

Answer:

we can create tables in ms word from Insert table

What is the benefit of encapsulation?

A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected

Answers

Answer:

B. To reuse code

What game is this? helpppppp

Answers

Answer:

the sims lol

Explanation:

Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4

Answers

Answer:

C = 3

Explanation:

The maximum number of physical memory accesses that may be caused by this single instruction is ; 3

This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores

Answers

Answer:

Explanation:

The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.

public static void newScore(int oldScore) {

       ArrayList<Integer> newScore = new ArrayList<>();

       String stringOldScore = String.valueOf(oldScore);

       for (int x = 0; x < stringOldScore.length(); x++) {

           newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));

       }

       newScore.add(newScore.get(0));

       newScore.remove(0);

       String newScoreString = "";

       for (int x:newScore) {

           newScoreString += String.valueOf(x);

       }

       int finalScore = Integer.parseInt(newScoreString);

       System.out.println(finalScore);

   }

A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?

Answers

Answer:

3 Volts.

Explanation:

Answer:

3 Volts

Explanation:

Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :

2.4 W = Voltage x 0.8 A

Then if you rearrange the equation, it would be :

2.4 W / 0.8 A = Voltage

Which is :

3 V = Voltage

Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B

Answers

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

Answer: The answer is D. A and B

Explanation: I took this test 5 mins ago and it was right.

explain mechanical computer ,electromechanical and electronic computer with example

Answers

Answer:

A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.

Explanation:

An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

Other Questions
what is the substance of air Was James Madison right; Political parties are dangerous and destructive to the American political system. agree or disagree with this statement and why Most solid solutes will dissolve ___ at ___ temperaturesA. slower, higherB. faster, higherC. faster, lower What was the primary debate in the Scopes trial?the role of religion in societythe value of the scientific methodO the powers of the state governmentthe validity of the theory of evolution can someone help answer this?? What were Texas settlers looking for when they left the us and were looking to settle in Mexican Texas? What is the percent change of 500 to 100 what is the state of y when y = k/x, x is halved. pls help me tbis is being timed HURRRRY!!!! Thank you How did King Philips War end, and what were the the two main effects of this war? Write a summary of the passage distinct from personal opinions or judgments. I WILL GIVE YOU BRAINLIEST What enlightenment ideas influenced Creoles to struggle for independence. But what WERE the enlightenment ideas What classification should this reaction have? CaC12 + F2 = CaF2 + CI2 Read this excerpt from Holes.The shovel felt heavy in Stanleys soft, fleshy hands. He tried to jam it into the earth, but the blade banged against the ground and bounced off without making a dent. The vibrations ran up the shaft of the shovel and into Stanleys wrists, making his bones rattle.It was still dark. The only light came from the moon and the stars, more stars than Stanley had ever seen before. It seemed he had only just gotten to sleep when Mr. Pendanski came in and woke everyone up.Using all his might, he brought the shovel back down onto the dry lake bed. The force stung his hands but made no impression on the earth. He wondered if he had a defective shovel. He glanced at Zero, about fifteen feet away, who scooped out a shovelful of dirt and dumped it on a pile that was already almost a foot tall.Which list shows the narrative structure of this excerpt?Stanley tries to jam the shovel into the earth, Mr. Pendanski wakes everyone, Stanley thinks his shovel is defective, Stanley sees Zeros pile of dirt.Stanley sees Zeros pile of dirt, Stanley thinks his shovel is defective, Mr. Pendanski wakes everyone, Stanley tries to jam the shovel into the earth. Mr. Pendanski wakes everyone, Stanley tries to jam the shovel into the earth, Stanley thinks his shovel is defective, Stanley sees Zeros pile of dirt.Stanley thinks his shovel is defective, Stanley tries to jam the shovel into the ground, Stanley sees Zeros pile of dirt, Mr. Pendanski wakes everyone According to the declation of independence when a government takes away the people rights to life liberty and pursuit of happiness what are people allowed to do? A) Ask the government for lowest taxes B) Alter or abolish the government C) Stop paying taxes D) give up the allowed the government to do what it wants In what way did political policies act as a centrifugal force in the Soviet Union during the late 1980s?A. The government made strides to be more open with the people in the population, which improved communicationB. The government gave the people more freedom to criticize the government which led to nationalist movements C. The government decided to increase its nuclear arms development, which angered the citizens. D. The government tightened its hold on the economy, which left many citizens unemployed E. The government made peace with the United States and its allies, which bolstered the economy. Please help me on due todayA personal enrichment goal is related to your life outside the classroom. You might set a goal to read every day or take on a new challenge in an extracurricular team, sport, or activity.Your completed portfolio will demonstrate how you worked to achieve your stated goals. Step 1: Decide what you want to achieve. Step 2: Set your goal. Step 3: Decide what actions you need to take to reach your goal. Step 4: Set a time frame. Step 5: Think about your assets and obstacles.Subject-Matter Achievement Goal1. My subject-matter achievement goal is:Answer:2. My action steps are:Answer:3. My time frame is:Answer:4. Assets and Strengths:Answer:5. Motivation:Answer:6. Obstacles:Answer:7. Solutions:Answer:Study/Organizational Skills Goal8. My study/organizational skills goal is:Answer:9. My action steps are:Answer:10. My time frame is:Answer:11. Assets and Strengths:Answer:12. Motivation:Answer:13. Obstacles:Answer:14. Solutions:Answer:Personal Enrichment Goal15. My personal enrichment goal is:Answer:16. My action steps are:Answer:17. My time frame is:Answer:18. Assets and Strengths:Answer:19. Motivation:Answer:20. Obstacles:Answer:21. Solutions:Answer: EMERGENCY! Need a speech on evolution by natural selection - a rough draft The Krebs cycle forms many products. Which option lists the correct products of the Krebs cycle after 1 molecule of glucose goes through it?net 2 NAD+, 2 ATP, 4 CO2, 2 FADHnet 1 NADH, 1 ATP, 2 CO2, 1 FADH2net 4 NADH, 4 ATP, 8 CO2, 4 FADH2net 2 NADH, 2 ATP, 4 CO2, 2 FADH2