1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
14

Sandy is replacing her broken laptop LCD screen with a new screen. During disassembly, she notices two cables that wrap around t

he screen and connect to the mini-PCIe card inside the laptop.​What will happen if Sandy breaks one of these cables?
A. The laptop LCD screen will not have power.B. The laptop webcam will not function.C. She will not be able to connect to Wi-Fi with the laptop.D. The laptop sound will not work.
Computers and Technology
1 answer:
schepotkina [342]3 years ago
6 0
Answer: C. She will not be able to connect to Wi-Fi with the laptop.


Explanation:


You might be interested in
Under the common criteria, which term describes the user-generated specifications for security requirements?
Irina-Kira [14]

The correct answer to this question is the:

“Protection Profile (PP)”

<span>According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.</span>

6 0
4 years ago
Please select the word from the list that best fits the definition Asking for review material for a test
Bess [88]

Answer:

B

Explanation:

7 0
3 years ago
Read 2 more answers
// This pseudocode is intended to describe
tensa zangetsu [6.8K]

Applying information of a computational language in pseudocode, a code may be written to describe estimating the price of an item on sale for 10% off.

Writting the code:

<em>// This </em><em>pseudocode </em><em>is </em><em>intended </em><em>to desribe</em>

<em>// computing the price of an item on sale for 10% off</em>

<em>start</em>

<em>input origPrice</em>

<em>discount = price * 0.25</em>

<em>finalPrice = origPrice - discount</em>

<em>output finalPrice</em>

<em>stop</em>

<em />

<em>// This pseudocode is intended to </em><em>compute </em><em>the number</em>

<em>// of </em><em>miles per gallon </em><em>you get with your car.</em>

<em>start</em>

<em>input milesTraveled</em>

<em>input </em><em>gallonsOfGasUsed</em>

<em>milesPerGallon = milesTraveled / gallonsOfGasUsed</em>

<em>output milesPerGallon</em>

<em>stop</em>

<em />

<em>// This pseudocode is intended to compute the number</em>

<em>// computing the per dday </em><em>cost </em><em>of your rent</em>

<em>// in a 30-day month</em>

<em>start</em>

<em>input rent</em>

<em>costPerDay = rent / 30</em>

<em>output rent</em>

<em>stop</em>

Learn more about the pseudocode here :

brainly.com/question/13208346

#SPJ1

3 0
1 year ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
What are the positive impact of computer in society
Brrunno [24]

Answer:

we can communicate many peoples

8 0
3 years ago
Other questions:
  • What makes sqlite an appropriate choice for an android application, compared to other relational database management systems, su
    15·1 answer
  • Which ethernet cabling standard defines an ethernet network that uses cat 3 or better utp cabling, operating at 10mbps?
    8·1 answer
  • The user interface design principle that places an emphasis on the intuitive flow of the interface (i.e. left to right and top t
    12·1 answer
  • Can anyone guide me on what to learn after C language?
    15·1 answer
  • Beverly is creating a website for her new clothing company. Aside from including photographs, how can she use the index page to
    8·2 answers
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Text and graphics that have been out of copied are stored in area called the _____
    15·2 answers
  • What is required when opening a checking account?
    10·2 answers
  • Question # 2
    6·1 answer
  • A processor's speed is measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!