1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
10

After clicking the Start button on your computer screen desktop, what option would you then select to examine system components

you might want to modify?
A. Documents
B. Programs
C. Control Panel
D. Find
Computers and Technology
2 answers:
pav-90 [236]3 years ago
4 0
<span>the option that you should select to examine system components you might want to modify would be: Control panel In windows, control panel is the place where user could manipulate basic system setting such as deleting an application, detecting hardware, checking system security, etc.</span>
Ber [7]3 years ago
3 0
<span>The thing that should be selected in order to examine the system components of the computer that you might want to modify after clicking the Start Button is the Control Panel. In the control panel, you will have many options to go through the changes or modifications you want to make. </span>
You might be interested in
PLZ HELP IM DOING 2 other 100 work and I’m running out of time for school 1. Imagine you are a screenplay writer Discuss some po
Alexus [3.1K]
My mans this is to long to read ); I got u tho lemme pick
5 0
3 years ago
What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for movi
mezya [45]

Answer:

Router        

Explanation:

  • A router is a network device that forwards data packets between networks. Its a network layer hardware device. For example a DSL router that connects to the Internet through an internet service provider.
  • Router is connects at least 2 networks (can be two LANs) and the ISP.
  • Router is used to transfer data from one network to another if both networks use same protocols.
  • It receives data in packets form and forwards the data to another router using a routing table. These data packets can be sent between devices or from devices to the internet.
  • The routing table is used to choose the optimal path for forwarding the packets between the source and destination hosts. Routing table configure the best route a packet can take to reach its destination using routing protocols. A Routing Protocol defines how routers connect with each other and share information that makes them choose routes on a computer network between source and destination. Routing tables can be configured statically (routes are fed manually) or dynamically (routes are updated based on information obtained  from other routers).
  • Router makes sure that the data packets reach right destination instead of being lost within the network and it also strengthen signals before transmitting them.
  • Routers reduce broadcast traffic. They form boundaries between broadcast domains and separate a network into multiple broadcast domains.
  • Router do not broadcast traffic and eliminates the packet when it detects a broadcast address. Routers also stop broadcast messages and don't route a broadcast message between broadcast domains.
6 0
3 years ago
Please program this in Python.
Temka [501]

lst = ["Star Wars", "Movie 2", "Movie 3", "Movie 4"]

print(lst[0])

I wrote my code in python 3.8. Best of luck

5 0
3 years ago
Kathy is a senior teacher in her school. She is conducting a group discussion between parents and teachers. Her role is to ensur
Fynjy0 [20]
She is the leader of the discussion
3 0
3 years ago
Read 2 more answers
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availabil
Mars2501 [29]
If I'm not mistaken firewalls should be enough as now the automatically  back up all data
4 0
3 years ago
Other questions:
  • Alice's Restaurant Supply offers a line of specialty food products to institutional
    6·1 answer
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • 1. The process of creating workable systems in a very short period of time is called
    5·1 answer
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • In Microsoft Word, when you highlight existing text you want to replace, you are in what
    11·1 answer
  • Which of the following is used to describe the information used in
    12·1 answer
  • What output is produced by
    10·1 answer
  • define the term computer hardware and its various types mentioning 5 examples of IP or devices with one diagram each​
    9·1 answer
  • "Bookings are to be stored in three separate
    7·1 answer
  • What is the maximum number of elements that will be visited by the binary search algorithm when searching a sorted 45-element ar
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!