1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
13

Once I install my secondary hard drive what two tasks need to be done?

Computers and Technology
1 answer:
Vlada [557]3 years ago
3 0
What is the use for the secondary hard drive?

If it is to run another operating system, such as a Linux flavour or another version of Windows, you would need to:

1) correctly format your drive

2) Install your OS

If you are using the HDD alongside your current OS, you need to:

1) Lower the boot priority of that drive in your BIOS

2) Format your hdd for use in your OS.

(Use NTFS for Windows and HFS+ for OS X)
You might be interested in
Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardw
Vikki [24]

Answer: a)True

Explanation:

  • Hardware is the component of computing system that contains physical devices and parts through which commands are given by user by touching or pressing the physical device.E.g- keyboard, mouse etc.
  • Software is the program set or series of instructions that is run in the form of command to get executed in computing system.It carries out to instruction to perform tasks.E.g-application of computer
  • Other option is incorrect as the statement is true.
  • Thus, the correct option is option(a).
6 0
3 years ago
Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
Gwar [14]

Answer: See explanation

Explanation:

Following the information given in the question, the testing process for the website will include testing the links that are on the site.

Another that ng to test is to check if the menus and the buttons are working properly. Furthermore, the layout should be ensured that it's consistent as well as the ease with which the website can be used.

5 0
3 years ago
Do you believe that oop should be phased out and we should start working on some alternative?
Ksju [112]
I don’t think we should because we all have our one choices that we should achieved and we should show
5 0
3 years ago
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
What determines the keystroke to open a cmos editor? how can you find this information?
Brums [2.3K]
<span>Determining the keystrokes of opening the cmos editor depends on the ram contained in the parameters in BIOS.It can be a very daunting task however made more accessible by instructions detailed in various ways by others.Research is needed.</span>
3 0
3 years ago
Other questions:
  • Write the definition of a method named printPowerOfTwoStars that receives a non-negative integer n and prints a string consistin
    10·1 answer
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • What are the two major components of a processor cooler assembly?
    15·1 answer
  • I have a question on an IT crossword the question is as follows
    12·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • What do the buttons on the paste options menu do
    11·1 answer
  • What impact download speeds on different computers
    13·1 answer
  • The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext
    11·1 answer
  • What is best defined as a phishing email that is targeted directly at you?.
    14·1 answer
  • Which tool in Access will give you a detailed report showing the most accurate and complete picture of
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!