1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
2 years ago
8

Computer must meet system requirements for successful installation (true or false)

Computers and Technology
2 answers:
zhuklara [117]2 years ago
3 0

Answer:

true because if the computer system receives an unsafe app

FinnZ [79.3K]2 years ago
3 0
True cause if you get to unsafe app
You might be interested in
During the troubleshooting of a pc that will not boot, it is suspected that the problem is with the ram modules. The ram modules
SOVA2 [1]

The RAM modules were not well placed or fitted firmly in the motherboard DIMM slots of the PC during toubleshooting.

What are RAM Modules?

RAM Modules have narrowly printed circuit boards that hold RAM chips (memory chips).

In order to function properly, RAM is expected to be placed or fitted firmly in the motherboard DIMM slots.

DIMM (Dual In-line Memory Module) is a module that contains one or several random access memory (RAM) chips on a small circuit board with pins that connect it to the computer motherboard.

Learn more on RAM Module here:

brainly.com/question/13308897?referrer=searchResults

#SPJ4

8 0
1 year ago
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
3 years ago
Read 2 more answers
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
The font size on presentation slides should not be smaller than _____ -point.
fredd [130]
The font size should not be smaller than 24 points.
3 0
4 years ago
Read 2 more answers
Is there a way for me to play a .mp3 file from my computer using Atom?
krek1111 [17]

They have a sound package. More info here: https://atom.io/packages/sound

7 0
3 years ago
Other questions:
  • Which is an example of an active visual interface? a display indicating the amount of ammunition for the currently equipped weap
    13·2 answers
  • A(n) ____________________ can improve system performance when two devices have different data transfer rates, as when copying mu
    12·1 answer
  • In which area is composing for games similar to composing for
    14·1 answer
  • PLEASE CLICK THIS VIRUS LINK
    7·1 answer
  • Anyone know a hat in time??
    11·1 answer
  • Midday is a good time to take a portrait outside.<br> true or false?
    8·1 answer
  • A disk has 4000 cylinders, each with 8 tracks of 512 blocks. A seek takes 1 msec per cylinder moved. If no attempt is made to pu
    8·1 answer
  • It is most commonly used for self-running presentations.
    8·1 answer
  • Question 1 of 10
    13·1 answer
  • is a programming model that focuses on an application's components and data and methods the components use. Group of answer choi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!