1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna1 [17]
3 years ago
7

Leah deals with several file conversions every day.

Computers and Technology
1 answer:
Lelechka [254]3 years ago
5 0
That’s not a question but good for her
You might be interested in
Yesterday Hunter's laptop screen appeared to go black. The laptop was still running, but he could not see the desktop or any gra
shepuryov [24]

Answer:

The video card needs to be replaced

Explanation:

The video card is a part of the motherboard that controls the graphic renderings of the computer. Once this is faulty, it can lead to several issues ranging from computer freezes or  computer crashes to most commonly, laptop black screens.

The most common test to see if the "black screen fault" is from the video card, is to connect the laptop to another monitor that has its own graphics rendering instrument. If it works on that monitor, Then the video card of the laptop is the problem.

Since this is the case detailed in the problem above, the video card of the laptop needs to be replaced.

3 0
3 years ago
What is the classification of the Gartner company?
Strike441 [17]

Answer:

It Is Multimedia

Explanation:

Trust Me

3 0
3 years ago
What do you think about the use the top song on a video you are creating
stepladder [879]

Hiya!


Using a popular song in a video your making is most definitely going to attract more viewers. It's all about making the video appeal to the person.

^Hope this helps

3 0
3 years ago
Read 2 more answers
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
brilliants [131]

Answer:

False

Explanation:

The RAM does lose its memory when you turn off the computer, unlike hard drive which is slower but keeps memory

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why does the PC send out a broadcast ARP prior to sending the first ping request
    12·1 answer
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • Its a zoom call
    7·1 answer
  • How do you turn on the Track Changes feature in a word-processing document?
    12·1 answer
  • Riya wants to save her project work in an external device so that she can show it to her class teacher. Help her to choose the d
    13·2 answers
  • Numerical methods are implementations of mathematical algorithms, but constructed with special consideration for accuracy of sol
    7·1 answer
  • How can you reduce the Impact of Hacking? <br>pls help with this &lt;3​
    9·1 answer
  • What is your favorite song? mine is "In the final"
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!