1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
13

Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha

rdware of her computer. While providing information to her support technician online, she mentions the name and version number of the program, as well as any special settings or configurations she thinks may be relevant.
Computers and Technology
2 answers:
Dennis_Churaev [7]3 years ago
5 0

Answer: Answer below.

Explanation:

I'm not fully sure myself, so don't agree with me fully.

I believe what she may have done wrong is tell the technician about a "program." A program doesn't have to do anything with physical hardware.

IceJOKER [234]3 years ago
5 0
Maybe what year she bought it I’m not sure
You might be interested in
Hannah is editing her brother’s birthday video. She has selected the usable shots and copied them onto her computer. What is the
Y_Kistochka [10]

Answer:

She needs to create the final music

3 0
1 year ago
Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
Tasya [4]

Answer:

IE 10

Explanation:

It is the newest version in the list of options

8 0
3 years ago
In 2-5 paragraphs, describe the points that Kendra needs to consider when choosing a telecommunications technology to meet her n
never [62]

Answer:

For marketing requirements, various communication mediums like digital communication medium, as well as non digital traditional communication medium can be used. Some like Blogs, Article directories, forums etc. can be used.

However, the AI, ML, DL and the traditional statistical analysis from Data Science can also be used. You need to install on your blog the chat-bots, And through the Chat-bots we can make a data set, that is in fact automatically generated, and contains email, phone numbers, addresses etc, and this data base can be used to run the Amazon Sage-makers. and a lot of meaningful information can be achieved through the prepared data-set through the Sage-maker.

Thus, you can find out quite easily what is good.

Sage maker, Chat bots and Blog technology is quite cost effective as well.

Explanation:

The above details covers all the requirements.

7 0
3 years ago
When you go to your school's computer support office, it will help if you have written down any _________ messages.
Finger [1]

Answer:

error

Explanation:

3 0
3 years ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
Other questions:
  • Your computer running Windows 7 is doing some very strange things with the operating system. You are fairly certain it is not a
    10·1 answer
  • Can you plug a usb 2.0 into a 3.0 port on your computer
    12·1 answer
  • Excel assigns the name ____ to the first excel table created in a workbook.
    10·1 answer
  • Most sus color in Among Us? Red is safe I saw him scan. I'll give brainliest because why not. I'm bored.
    14·2 answers
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • Where would you go to access frequently used icons?
    12·2 answers
  • Create a mobile app plan using PowerPoint slides to show mock-ups of screens,
    6·1 answer
  • What is geolocation?
    8·1 answer
  • Edit the following statement so it uses the constant named YEAR:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!