1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
9

If the pc-doctor software is installed on a computer's hard drive, what two different ways can the program be started?

Computers and Technology
1 answer:
Bingel [31]3 years ago
4 0
The program would have to be started in safe mode or by starting up the computer.
You might be interested in
Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
NemiM [27]
The answer is column F. During relative copy and paste in Excel, the positioning of the '$' symbol effectively indicated an absolute reference to a position, so that is not updated. Therefore, in the formula '<span>=F$5+12</span>', only column F is updated. 
8 0
4 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Write a short note on Computer<br>impact on<br> our society?​
Vesna [10]

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

8 0
3 years ago
Read 2 more answers
In a brief essay explain the security vulnerabilities of transition methods (6to4, etc.)
vlabodo [156]

Answer:

While transiting from IPv4  to IPv6, many offices and companies use both the protocols (Ipv4 and IPv6) at the same time. This scenario can increase the risk  rate of attack twice. All the flaws and vulnerabilities could be overlooked easily when transition is done.

On the other hand, while transiting Ipv6 to IPv4, the router does not tells or depicts that the communication is appropriate or if it could be used as a part of DoS attack that make it so much harder to trace the origin back.

The reason for the vulnerability of Transport Relay Translators (TRT) is that they do not apply Internet Protocol Security (IPSec) and thats why they are not secure.

i hope it will help you!

7 0
4 years ago
What kind of skills does an electronics engineering tech need as requirement in the workplace?
eduard

Answer:

Electrical and electronics engineering technicians should also possess the following specific qualities: Logical-thinking skills. Electrical and electronics engineering technicians must isolate and then identify problems for the engineering staff to work on. They need good reasoning skills to identify and fix problems.

Explanation:

3 0
3 years ago
Other questions:
  • Which description best describes how mass spectroscopy is useful in the field of forensic toxicology
    6·1 answer
  • Alpha Technologies, a newly established company, wants to share information about its work with people all over the world. Which
    9·1 answer
  • In a(n) ________ either one condition or some other condition must be met in order for an event to take place.
    11·1 answer
  • You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
    6·1 answer
  • There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
    15·1 answer
  • _____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterp
    11·1 answer
  • Who is Mr.Anonymous?
    5·2 answers
  • Which pair of devices have the same input motion and different outputs?
    15·1 answer
  • The PowerPoint view in which you can edit the slide master is called ______________.
    7·1 answer
  • Use a slicer to filter the data in this table to show only rows where the Category value is Coffee or Meals
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!