1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
7

My computer keeps shutting down I've tried to completely wipe the memory but it didn't work do you have any ideas how to fix it

or what's happening?​
Computers and Technology
1 answer:
seropon [69]3 years ago
8 0

Answer:

You could have a bug, virus, or you might have been hacked the most I can tell you is try to contact a technician to check it and try to help you. It could also be a problem with your internet, maybe you hit your computer against something and it broke something inside, or it could be a technical glitch. I hop this helps! Good Luck fixing your computer!

You might be interested in
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
What are the three major functions of a game engine?
Harrizon [31]
read that hope this helped

8 0
3 years ago
A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following
Rom4ik [11]

Answer:

b. Using either the read-write or read-only community string.

Explanation:

The SNMP agent on a router authenticates any SNMP Get requests received from the NMS using either the read-write or read-only community string.

In the SNMPv2c, if the NMS sends either the read-write or read-only community string requests, SNMP Get requests will be allowed.

7 0
3 years ago
Read 2 more answers
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
Vlad [161]

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

3 0
3 years ago
Which of the following components helps to limit the front-to-back movement of the crankshaft? 
iris [78.8K]
The correct answer is A. The thrust bearing

It is used to help limit the front-to-back movement of the crankshaft.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
    14·1 answer
  • A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
    12·1 answer
  • An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t
    12·2 answers
  • If you flash UEFI and now your computer is no longer working, is there anything you can do to correct the situation?
    5·1 answer
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • Even if you cannot afford it you should donate at least 5 of your earnings to charity true or false
    8·1 answer
  • Explain motherboard in detail
    14·2 answers
  • Need answer ASAP!!!!
    14·1 answer
  • How do you hack a iPhone, Like If you forgot your password and want to get back in your phone. What do you do?
    7·2 answers
  • Which directory contains the initrd file? in suse linux
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!