1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
4 years ago
11

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri

consider prior to taking the laptop apart? A. Try an external device before replacing the motherboard.B. Make sure you have the correct processor for the motherboard.C. Verify that the laptop is not under warranty.D. Determine whether a teardown procedure is available.
Computers and Technology
1 answer:
Schach [20]4 years ago
4 0

Answer:

Option b, Option c, and Option d  are the correct options.

Explanation:

While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.

You might be interested in
Using a USB flash drive, you intend to install Windows 10 on several computers. To save time, you would like to automate the
artcher [175]

Answer:

Create an answer file named config.xml. Place the file on a USB flash drive and run setup.exe.

Create an answer file named automated.exe. Place the file on a USB flash drive and run

4 0
3 years ago
Do the police check your mobile device during police checks?
JulsSmile [24]

They cannot legally check it without a warrant.


Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.


If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.

4 0
3 years ago
State two ways of preventing virus attack on a computer.​
Goshia [24]

Answer:

updating the computer and having an anti virus on your computer

5 0
3 years ago
Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
inessss [21]

Answer:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

Explanation:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

8 0
4 years ago
Plssssssssssssssssssssssss helpp
brilliants [131]
Tell me the question
8 0
4 years ago
Other questions:
  • The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
    15·2 answers
  • Which of the following careers is part of the Printing Technology pathway?
    10·1 answer
  • What size hard disc is recommended for powerpoint writting
    14·1 answer
  • Which of the following software costs money?
    6·2 answers
  • Which internet explorer 11 feature enables it to correctly display pages that were developed using older technologies?
    14·1 answer
  • How many words fit on a double-spaced page?
    11·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    6·1 answer
  • What is one advantage of using object-oriented programming?
    14·2 answers
  • TIME REMAINING
    9·1 answer
  • What is the difference between MAC address and IP address?<br> Thanks in advance
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!