In Microsoft Windows, which of the following typically happens by default when a file is "double-clicked"?

Answers

Answer 1
The file will open, or executes.

Related Questions

What is a sluggish beta signal detection theory?

Answers

Answer: Humans do change their response criterion, but more slowly than they should.

Kazaa software is commonly used to share audio and video files and documents over the internet. these files are located in? users' computers and not on a centralized server. kazaa is an example of? ________.

Answers

Kazaa software is commonly used to share audio and video files and documents over the internet., these files are located in the Cloud? Users' computers and not on a centralized server. Kazaa is an example of a peer to peer application.

What is the first step that a server should take after assessing a situation and deciding to discontinue service to a guest?

Answers

An alcohol server attending to a client in a restaurant may decide to discontinue services for many reason. When the decision to discontinue service has been made, the server should IDENTIFY A BACK UP CO WORKER who will support in the situation, in case things get out of hand. So, in this situation, the first thing to do is to SEEK FOR ASSISTANCE AND DISCONTINUE SERVICE. 

Question3 why can you not install the server migration tools to the server running windows server 2008 r2 using the add roles and features wizard on your server running windows server 2012 r2?

Answers

After you've installed the Migration Tools on Windows Server 2012 R2, you can register the tools on a Windows Server 2008 migration source machine by running smigdeploy.exe from your Windows Server 2012 R2 migration destination machine, but you cannot install the tools on Windows Server 2008.

For full information about how to deploy the migration tools, including how to run smigdeploy.exe to get the tools registered on a Windows Server 2008 source machine, see Install, Use, and Remove Windows Server Migration Tools for Windows Server 2012.

Answer:

Explanation:

The truth is, hiring a professional web designer or design firm is not for everyone.

If you’re a new business without much revenue, then using an affordable website builder is exactly what you should be doing.

However, if you own a small or medium sized business, using a ‘free’ website builder could cost your company many tens of thousands of dollars in wasted man hours and even more money in the opportunity cost of lost potential revenue.

In this article, we will address several aspects of the debate, “web designer vs website builder?” Who would be better off hiring a professional and the specific advantages and disadvantages of doing either?

A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.

Answers

a constraint :) Hope that helped! 

A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of integers can be stored in the computer? if 1’s complement is used? (express your answers in decimal.)

Answers

Two's-complement notation can represent all integers from - 2^(N-1) to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -128 to 127 inclusive. 

One's-complement notation can represent all integers from - 2^(N-1) - 1 to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -127 to 127 inclusive

The word length of a computer is simply the number of bits, the computer can process

The word length is given as:

[tex]n = 8[/tex]

(a) 2's complements

The smallest integer in the 2's complement is::

[tex]N= -(2^{n-1})[/tex]

While the largest integer is:

[tex]N= 2^{n-1} -1[/tex]

So, we have:

[tex]Smallest = -(2^{8-1})[/tex]

[tex]Smallest = -(2^7})[/tex]

[tex]Smallest = -128[/tex]

And the largest is:

[tex]Largest= 2^{8-1}-1[/tex]

[tex]Largest= 2^{7}-1[/tex]

[tex]Largest= 128-1[/tex]

[tex]Largest= 127[/tex]

Hence, the computer can store all integers from within an inclusive range of -128 to 127, using the 2's complement

(b) 1's complements

The smallest integer in the 1's complement is::

[tex]N= -(2^{n-1}) + 1[/tex]

While the largest integer is:

[tex]N= 2^{n-1} -1[/tex]

So, we have:

[tex]Smallest = -(2^{8-1})+1[/tex]

[tex]Smallest = -(2^7})+1[/tex]

[tex]Smallest = -128+1[/tex]

[tex]Smallest = -127[/tex]

And the largest is:

[tex]Largest= 2^{8-1}-1[/tex]

[tex]Largest= 2^{7}-1[/tex]

[tex]Largest= 128-1[/tex]

[tex]Largest= 127[/tex]

Hence, the computer can store all integers from within an inclusive range of -127 to 127, using the 1's complement

Read more about word lengths at:

https://brainly.com/question/5046303

When the pickbox appears on the screen and the "select objects:" prompt appears at the command line, you can type the selection option you want to use (usually one or two letters)?

Answers

Answer = Y/N (although many other options could be programmed)

Which of the following information sources was not directly affected by the Telecommunications Act of 1996?

A. Cable television
B. Newspaper publishing
C. Telephone services
D. The Internet

Answers

Apparently, the answer is newspaper publishing.

Since telecommunication is defined to use wireless and electrical protocols to transmit data.

You grant a user the ntfs permissions needed to access a file. you then move the file to a different location on the same drive. is the user still able to access the file?

Answers

Yes, when you move the file, its permissions go with it.

A mismatch between the type of printer connected to a system and the software printer driver installed is an example of a ____.

Answers

ERROR! It is an example of an error

Explain your experience with the Internet including what search engine you typically use and why, how ethics play into the use of the information you gather, and how you protect your search privacy.

Answers

My experiences with the internet have been good, with not really and problems. I use Bing, a search engine created by Microsoft. I use Microsoft because I think I get better results, and with your searches you get points that you can redeem for prizes and rewards. I don't generally see anything that is ethnic related, I tend to stay on the path of schoolwork, and in my settings on my Bing account there is setting to protect my search history. 

A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.

Answers

A selective backup allows a user to choose specific files to back up, regardless of whether or not the files have been changed.

What are five features of word 2016 you would use to capture the attention of the target audience? Defend you decisions

Answers

Here is my top 5:
1. Auto save feature. It's very important not to lose the writing when something happened to your computer while you were writing.
2. Synchronization with OneDrive. If something happened to your hard drive, you can backup your docs with OneDrive cloud.
3. You can view and edit PDF documents. Everyone needs it.
4. You can share your documents with other people and you can edit it together in online mode.
5. Improved "Red mode" which disables extra menus to view your documents.

Using features like WordArt, SmartArt, Templates, Text Effects, and Styles in Word 2016 can significantly enhance the visual appeal of your documents and capture your audience's attention.

Using Microsoft Word 2016 effectively can significantly enhance the visual appeal of your documents and captivate your target audience. Here are five features that can help achieve this:

WordArt: WordArt allows you to create text with decorative styles and effects such as shadows, outlines, colors, glows, bevels, gradients, and 3-D effects, making your text stand out.SmartArt: This feature helps in creating diagrams and visual representations of information, which can make complex data more understandable and engaging.Templates: Word provides a variety of templates that can serve as a starting point for creating professional-looking documents quickly and easily, ensuring consistency and saving time.Text Effects: Utilizing text effects like shadows, reflections, glows, and bevels can add depth and dimension to your text, making it more visually appealing.Styles: Predefined styles help in maintaining a consistent look and formatting across your document, which is crucial for readability and professional appearance.

By combining these features, you can create documents that are not only informative but also visually compelling, effectively capturing and maintaining your audience's attention.

A "flat file" is also called

Answers

i think it would be
Unstructured file

Using a network without the network owner's permission is known as ________.

Answers

Using a network without the network owner's permission is known as piggy backing.

The server core installation option in windows server 2012 effectively removes _______:

Answers

Answer = Graphical User Interface

A software architecture that divides an application into view, business logic, and data is called a(n) ________.â

Answers

Software architecture divides an application into views

How do you prevent unauthorized personnel from accessing your cisco device through the console port?

Answers

You can blacklist the mac address of the device which you don't want to be connected.
It depends on a version of the console but in my view the most useful and effective way is to physically secure your device and protect it by a complex password. And keep your password in a safe place.

Why would a server 2008 r2 dns server have a different security baseline than a windows xp client?

Answers

The Answer is If systems perform different functions, security settings can restrict one function but not the other. Also, XP is a desktop OS vs. Server 2008R2 is a Server OS. An XP client can never be a DNS server.

These questions are ambiguous and silly.

A __________ tries to break it security and gain access to systems with no authorization, in order to prove technical prowess.

Answers

Black-hat hacker is the answer. Hope this helps.

Owners of tvs with a ________ can identify and block objectionable programming.

Answers

Owners of TVs with a V- chip can identify and block objectionable programming. V-chips is a technology used in TVs. Its purpose is parents to manage what their children (which programs) are watching. The ratings of the programs are encoded before the program is aired and according this encoded information V-chips make its decision.

Owners of TVs equipped with a V-Chip can block content deemed unsuitable for children. The V-Chip allows parents to control what children watch by using the television ratings system to restrict certain programming. While the FCC regulates over-the-air content, cable and satellite services are not traditionally under the same indecency restrictions.

Owners of TVs with a V-Chip can identify and block objectionable programming. The V-Chip technology was mandated by Congress in the 1990s to give parents control over the television content their children are exposed to. This system works in conjunction with the television ratings system, enabling the blocking of programming based on its rating category which may include levels of violence, language or sexual content.

The move to empower viewers at home came in response to concerns about the potential impact of indecent content on minors. While the Federal Communications Commission (FCC) has enforced regulations on over-the-air broadcast content, particularly when children are likely to be in the audience, this control has traditionally not extended to cable and satellite services. These subscription-based services are considered to provide viewers with greater control over incoming content, despite following similar standards largely for commercial reasons.

A(n) ____ retains all of the existing computer settings possible including user files, applications, and application settings. active installation clean installation upgrade domain installation

Answers

An upgrade retains all of the existing computer settings possible including user files, applications, and application settings. When making an upgrade newer version of software or hardware is added on the same product, computer for example. The older version of the same product is replaced with a newer version of a software or hardware product. 

A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) ________.

Answers

Email client as port 25 is the default port for an email server.

Blank browsing allows you to open multiple web pages at one time what's the answer webbed threaded tabbed reticulated

Answers

The answer is "tabbed." Tabbed browsing allows someone to open multiple web pages at the same time by opening multiple tabs. Users can switch back and forth between tabs without having to open a new browser window or navigate away from a web page and then return to it later.

What subnet mask would you use when configuring a tcp/ip client with an ipv4 address on the 172.16.32.0/19 network?

Answers

172.16.32.0/19  = has a mask 255.255.224.0

Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the following statements about these symbols is correct? A. Symbol 1 represents a fixed resistor, symbol 2 represents a fuse, symbol 3 represents a relay coil, and symbol 4 represents a lightbulb. B. Symbol 1 represents a battery, symbol 2 represents a lightbulb, symbol 3 represents a fuse, and symbol 4 represents a relay coil. C. Symbol 1 represents a wire connection, symbol 2 represents a battery, symbol 3 represents a variable resistor, and symbol 4 represents a fuse. D. Symbol 1 represents a fuse, symbol 2 represents a fixed resistor, symbol 3 represents a battery, and symbol 4 represents an SPST switch.

Answers

The answer to this question is: Symbol 1 represents a transistor, symbol 2 represents a diode, symbol 3 represents a resistor, and symbol 4 represents an LED.

lol whats the answer

Individuals belonging to the subculture known for love of motorbikes and leather. Rival of the group known as ‘mods’.

Answers

Individuals belonging to the subculture known for love of motorbikes and leather are called Rockers. Rival of this group is called 'mod'.
There were two conflicting British subculture, Rockers and mod. Rockers have love for leather, so they are also called as leather boys.
The subculture of Rockers was centered on motorcycling, while subculture of mod was centered on music and fashion.

On a vehicle with a manual transmission, a frequent mistake is shifting

Answers

On a vehicle with a manual transmission, a frequent mistake is shifting into a higher gear at too slow speed.
When shifting gears on the vehicle with a manual transmission, you should press the clutch all the way to the floor.
There are two types of transmissions of vehicles, manual and automatic. In manual transmission driver is responsible for shifting gears as the speed f vehicle changes while in automatic driver does minimal work. 

Dns (domain name system) servers translate all domain names into _____.

Answers

they translate them into ip addresses.

Is a technique for representing an object as a stream of binary digits, which allows objects to be read and written from files with their state maintained?

Answers

The technique is called serialization and deserialization.
Other Questions
f(x) = 5x 4 and g(x) = 3x 2, find (f g)(x). When converting from kilometers to meters, the decimal is moved _______. a. three places to the left b. two places to the left c. three places to the right d. two places to the right. Which orbital would the electron of a ground state hydrogen atom occupy? 1s 1p 2p none of the above 0s? Find the value of angle M Read the passage. During the whole of a dull, dark, and soundless day in the autumn of the year, when the clouds hung oppressively low in the heavens, I had been passing alone, on horseback, through a singularly dreary tract of country, and at length found myself, as the shades of evening drew on, within view of the melancholy House of Usher. I know not how it wasbut, with the first glimpse of the building, a sense of insufferable gloom pervaded my spirit . . . In this excerpt from Edgar Allan Poe's "The Fall of the House of Usher," what mood do these lines evoke in the reader? one of hostility one of bleakness one of serenity one of terror What are the nearest cross streets to the Carnegie Deli? After the entry of the united states into the war, germany decided it's only hope for victory was to: You come to work one morning to discover the electricity has gone off in the refrigerator in the laboratory. This refrigerator houses the reagents needed to perform the laboratory tests. How would you proceed? The most severe diffuse brain injury caused by rotational acceleration is most likely to be located: EASY 5 POINTS!!! You want to help build an awards podium for a track meet. If the podium has the dimensions shown, what is its volume? What points do you think hawthorne is trying to make about organized religion? Jupiter contains a number of small moons that are thought to be captured comets or material ejected by collisions with larger objects. what is the evidence for this theory? Jason and Jenny are out on a lunch date. Jason gives Jenny a bouquet that has 4 roses, 3 carnations, and 4 orchids. They decide that Jenny gets to choose their lunch order if the flower she randomly picks from the bouquet is a carnation or a rose. What is the probability that Jenny gets to choose lunch? Ethnography is the most common form of ________ research, which relies on what is seen in the field and in naturalistic settings more than it does on statistical data helium is the lightest monatomic element is this a chemical property A cart is pulled by a force of 250 N at an angle of 35 above the horizontal. The cart accelerates at 1.4 m/s2. The free-body diagram shows the forces acting on the cart. The mass of the cart, to the nearest whole number, is kg? A cylinder has its height doubled and its radius cut to one third. What is the ratio of the volumes of the modified cylinder to the original cylinder? How did Charlemagne improve the lives of people in Europe? The reaction below is exothermic: 2so2 (g) o2 (g) 2so3 (g) le chtelier's principle predicts that ________ will result in an increase in the number of moles of so3 (g) in the reaction container. The price of greatness is responsibility meaning Steam Workshop Downloader