1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
1 year ago
12

the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th

e error message D click NO
Computers and Technology
1 answer:
lesya692 [45]1 year ago
6 0

Answer:

I think you should restart the computer

You might be interested in
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
oee [108]

Answer:

The result of combining the both tables is:

Employee(EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

Since the EmployeeNum is the primary and it is available in both tables, what happens is that, it will not list the primary key column twice. It will list the primary key first then all the other attribute in the first table followed by the attribute in the second table. And it will take note so as not to repeat attribute that already occur in the first table.

For instance; in this case, besides EmployeeNum, LastName and FirstName also appear in the both tables but only one instance of them were listed in the resulting table.

4 0
3 years ago
What is the term for a server at the highest level of the Domain Name System (DNS)?
Igoryamba

Answer:

Root name server, root level server, or root server.

Explanation:

Root level server, root name server or simply root server is the server responsible for basic functions in translating domain names into IP addresses.  It is situated in the root zone of the domain name system (DNS) which is the largest layer in the DNS' name space.  

<em>Hope this helps!</em>

5 0
4 years ago
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Kipish [7]

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

5 0
3 years ago
Read each of the following statements about Computer Science and explain why you think that statement is true.
larisa86 [58]

Answer:

sytaragadr

Explanation:

3 0
3 years ago
Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number an
grigory [225]

Answer:

Explanation:

The following code is written in Java. It reads every input and checks to see if it is valid. If it is it writes it to the output file.

import java.io.File;

import java.io.FileNotFoundException;

import java.io.FileWriter;

import java.io.IOException;

import java.util.Scanner;

class Brainly {

           public static void main(String[] args) {

               try {

                   File myObj = new File("C:/Users/Gabriel2/AppData/Roaming/JetBrains/IdeaIC2020.2/scratches/input.txt");

                   Scanner myReader = new Scanner(myObj);

                   FileWriter myWriter = new FileWriter("C:/Users/Gabriel2/AppData/Roaming/JetBrains/IdeaIC2020.2/scratches/output.txt");

                   while (myReader.hasNextLine()) {

                       String data = myReader.nextLine();

                       int sum = 0;

                       for (int x = 0; x < 5; x++ ) {

                           sum += data.charAt(x);

                       }

                       int remainder = (sum % 10);

                       System.out.println(remainder);

                       System.out.println(data.charAt(5));

                       if (remainder == Integer.parseInt(String.valueOf(data.charAt(5)))) {

                           System.out.println("entered");

                           try {

                               myWriter.write(data + "\n");

                               System.out.println("Successfully wrote to the file.");

                           } catch (IOException e) {

                               System.out.println("An error occurred.");

                               e.printStackTrace();

                           }

                       }

                       sum = 0;

                   }

                   myWriter.close();

                   myReader.close();

               } catch (FileNotFoundException e) {

                   System.out.println("An error occurred.");

                   e.printStackTrace();

               } catch (IOException e) {

                   e.printStackTrace();

               }

           }

       }

3 0
3 years ago
Other questions:
  • Instructions: Type the correct answer in the box. Spell the word correctly.
    5·2 answers
  • One of the most toxic components of a computer is the
    11·1 answer
  • What is DBMS software used for?
    5·1 answer
  • The chip that controls the radio frequency waves within a device
    9·1 answer
  • URGENT!! Ronald wants to search for an image of a sports car. Ronald doesn’t have to remember the specific name of the image to
    5·1 answer
  • Question 9 (1 point)
    14·1 answer
  • In a multiple-column record of a data file, ______ represent different variables and _______ represent different cases
    15·1 answer
  • How do you add verticse in edit mode blender
    5·1 answer
  • Commercial technical data and commercial software:_________.
    11·1 answer
  • ? Question<br> How are the Internet and the World Wide Web different from each other?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!