1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
11

When the POST is complete,t he operating systems is loaded into?

Computers and Technology
1 answer:
Lina20 [59]3 years ago
4 0
<span>After the POST is successfully completed the CPU searches Storage devices for special files that indicate the beginning of the OS and then loads it into memory. </span>

<span><span>The sequence in which the storage devices are searched is part of the configuration set-up stored in BIOS. 

</span><span>Once the Operating System (OS) is located, the CPU copies what’s called the 'boot record' from the OS into DRAM. 

</span><span>Control is then passed to the 'boot record' in DRAM, which then continues loading the rest of the OS. 

</span><span>This process continues until the OS load is completed. 

</span><span>When the OS load is completed the Desktop appears in the display and waits for you, the user, to tell it what you want it to do.</span></span>
You might be interested in
Nick’s computer has been restarting on its own. what action should he take to solve this issue?
serg [7]
Check for possible software updates, my reasoning for that is the computer could be trying to initiate an update but is stopped by the user if you don't want it to update go to settings and turn off auto update
5 0
3 years ago
How to create table/form libreoffice
Alexxandr [17]

Try using this website to help:

https://help.libreoffice.org/Writer/Inserting_Tables

5 0
4 years ago
In this chapter, you learned that although a double and a decimal both hold floating-point numbers, a double can hold a larger v
Tju [1.3M]

Answer:

The DoubleDecimalTest class is as follows:

using System;

class DoubleDecimalTest {

 static void Main() {

     double doubleNum = 173737388856632566321737373676D;  

    decimal decimalNum = 173737388856632566321737373676M;

   Console.WriteLine(doubleNum);

   Console.WriteLine(decimalNum);  } }

Explanation:

Required

Program to test double and decimal variables in C#

This declares and initializes double variable doubleNum

     double doubleNum = 173737388856632566321737373676D;

This declares and initializes double variable decimalNum (using the same value as doubleNum)

     decimal decimalNum = 173737388856632566321737373676M;

This prints doubleNum

   Console.WriteLine(doubleNum);

This prints decimalNum

   Console.WriteLine(decimalNum);

<em>Unless the decimal variable is commented out or the value is reduced to a reasonable range, the program will not compile without error.</em>

8 0
3 years ago
Which of the following activities have been made possible because of improvements in computer networks? Check all of the boxes t
Artist 52 [7]

Answer:

Option B is correct.

Explanation:

Earlier when the computer network didn't meet with the requirements, it was too difficult to store data safely and even to access the data, it required too much effort.

Now with the help of a well-designed computer network, we can keep the data with proper protection and we can easily access it whenever we need it.

With the Improvements in computer networks, We can create a huge data store and keep the different data in different parts which will be saved in the server and the benefit is that if data is crashed, we can easily retrieve it from the server.

7 0
4 years ago
Read 2 more answers
The ___________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.
Mumz [18]

Answer:

"Security Kernel" is the correct answer for the above question.

Explanation:

  • Security Kernel is a part of the kernel which is present in the operating system. The work of kernel is to manage the resource, boot the operating system and the other work.
  • The security kernel is used to secure or control the access of the software and the hardware from the other source and the user which can access the computer for the wrong purpose.
  • The above question asked about the central part of the operating system which is used to control access. This part is known as "Security Kernal".
6 0
4 years ago
Other questions:
  • Is microsoft word the same as microsoft office?
    12·2 answers
  • Imagine you are having a conversation about simulation training programs with one of your friends (it is a slow night). You are
    5·1 answer
  • The __________ clash of clans and candy crush saga are video games that exploit the real world–digital world convergence by buil
    10·1 answer
  • For each vertex v of the DAG, in the topological ordering, compute the length of the longest path ending at v by looking at its
    6·1 answer
  • Which argument forces a writer to return and change the input berfore resolving unicode erroe
    8·1 answer
  • What should an administrator use to more easily assign database access permissions to multiple users?
    6·1 answer
  • There is no reason to put comments in our code since we knew what we were doing when we wrote it. TRUE
    14·1 answer
  • In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
    15·1 answer
  • Which option correctly describes a DDMS application?
    6·1 answer
  • Devices on a network are identified by what?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!