1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
1 year ago
14

Can computers be opened from the All programs submenu

Computers and Technology
1 answer:
Bad White [126]1 year ago
8 0

Answer:

I am pretty sure...if not try duck duck go

You might be interested in
Explain what a surrogate key is.
Irina18 [472]

answer - surrogate key is a unique identifier used in databases for a modeled entity or an object. It is a unique key whose only significance is to act as the primary identifier of an object or entity and is not derived from any other data in the database and may or may not be used as the primary key.

4 0
3 years ago
I am having horrible trouble with deciding if I should get Audacity or Adobe Spark for recording, if someone could help me choos
lbvjy [14]

I haven't really used either, but people I know would prefer using Audacity.

5 0
3 years ago
Read 2 more answers
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
You have double-clicked a device in Device Manager to open its Properties window. Where can you find information about IRQs the
Setler [38]

To find information about IRQs the device might use, make alteration to the View menu option and then change it to Resources by type.

<h3>How do one find information about IRQs?</h3>

The best way to see IRQ information in Windows is through the use of Device Manager.

Note that for one to be able to find information about IRQs the device might use, one has to makes some changes to the View menu option and then one can change it to Resources by type to be able to see the Interrupt request (IRQ) part.

Learn more about Device Manager from

brainly.com/question/869693

#SJ1

7 0
2 years ago
Tasked to install additional RAM in a computer. He unplugs the system from the power source and removes the PC cover. What shoul
Galina-37 [17]

Answer:Put on an ESD(Electrostatic discharge) strap.

Explanation: An ESD wrap which is also known as ground wrap is a sort of a wrap that is tied around the wrist to protect the person electronic equipment's static electricity.  This wrap produces anti static energy which help in not producing any static charge while the technician touches the inner parts of the CPU of other internal parts of the system.

4 0
3 years ago
Other questions:
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • Case project 5-1 Network Integration ​
    5·1 answer
  • Which of the following is an example of a wanted versus I need
    5·1 answer
  • You are the manager and two employees are having issues with each other. These issues are affecting their happiness and producti
    11·1 answer
  • According to the SANS Institute, a __________ is typically a document that outlines specific requirements or rules that must be
    13·1 answer
  • Join my among us code<br> SHUHZF
    6·2 answers
  • Cutting of trees is bad or not bad​
    6·2 answers
  • A Python programmer is writing a function definition. What syntax should be used?
    12·2 answers
  • Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation
    9·2 answers
  • Make a list of any four computer that were used in the history of computer.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!