1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
14

If it malfunctions and I can throw it, then it's a hardware problem; if I have to yell at it because there is nothing to pick up

, then it must be a BLANK problem.
Computers and Technology
2 answers:
blsea [12.9K]3 years ago
6 0

Answer:

Software

Explanation:

"If it malfunctions and I can throw it, then it's a hardware problem; if I have to yell at it because there is nothing to pick up, then it must be a <u>software</u> problem. "

This is a known sentence in IT environments, especially in initial courses, since it is given as an easy way to learn the difference between Hardware & Software concepts.

The hardware is all the physical and material components and devices that make up the computer. For example: the motherboard, the monitor ...

The software is the entire logical and intangible set of data, programs, instructions, computer rules and non-physical elements that are used to perform certain tasks and that are stored on a computer.

The interaction between the Software and the Hardware makes the machine operational, that is, the Software sends instructions to the Hardware making its operation possible.

kobusy [5.1K]3 years ago
3 0
Software problem.
Assuming "Software" is one of the available answers.

You might be interested in
Jasmine took many pictures at a photo shoot. She wants to transfer these pictures from her camera to her laptop for image enhanc
hoa [83]
The answer would more likely be A
If it’s not correct I’m very sorry
5 0
3 years ago
John would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he re
maxonik [38]

A list of multiple choices is given;

<span>a)      </span>Purchase a home in the city center instead.

<span>b)      </span>Rent the apartment anyway.

<span>c)       </span>Rent the apartment with a roommate.

<span>d)      </span>Purchase a home in the suburbs instead.


The answer is (C)


John should look for an apartment and share it with a roommate. This will bring down rent expenses to 50% as both John and the roommate will be cost sharing the rent. If the rent expenses go down by 50%, he’ll be able to save an additional 10% and use it for other expenses.

4 0
3 years ago
You are required to deploy a Docker-based batch application to your VPC in AWS. The application will be used to process both mis
leonid [27]

Answer:

The answer for the given question is explain below:-

Explanation:

Using ECS as the container management tool and then set up a mix of Reserved and Spot EC2 Instances for storing mission-critical and non-essential batch jobs.

  • The Control-M jobs have a client descriptor to determine that program server to operate a job on.
  • A load balancing basically used for a host party.
  • We can define an individual server or a server party, all of this is to say a specific name for a network series.
8 0
3 years ago
What is the different between ethical and legal issues?​
Bad White [126]

Answer:

Ethical issue is anything that a person believes to be right or wrong that generally comes down based on personal opinion or a persons belief or philosophy while legal issue is any act done by a person whether he/she thinks it is right or wrong, whether it conforms to the law and needs legal expertise.

Explanation:

7 0
4 years ago
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
Other questions:
  • A company ABC asked you to design a simple payroll program that calculates and employee's weekly gross pay, including any overti
    9·1 answer
  • Which of the following configuration files would you document
    6·1 answer
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
  • You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to
    8·2 answers
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    13·1 answer
  • Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app and the app. The has limite
    15·2 answers
  • what is the term used when a virus takes control of features on your computer and transports files or information automatically?
    10·1 answer
  • Help me code plz i using python language on laptop please answer or comment if u want to help
    12·1 answer
  • Sql injections is an attack in which __ code is inserted into strings that are later passed to an instance of sql server.
    12·1 answer
  • What kind of cable would you use to connect a network printer to the soho router if you were using a wired connection to the net
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!