1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
6

You have purchased a used computer from a computer liquidator. when you boot the computer, you find that there has been a passwo

rd set on the bios. you need to clear the password so that you can edit the cmos settings. you want to keep all other cmos settings. what should you do?
Computers and Technology
1 answer:
tatiyna3 years ago
6 0
You need to total reset the computer back to manufacture reset and then you can put a password that you would like to use
You might be interested in
PLEASE HELP WHATS THE ANSWER
Mkey [24]

Answer:

C

Explanation:

A ends the whole html stuff

B starts a link

D is just the file extension for html files

4 0
3 years ago
Read 2 more answers
When one user could perform a query to determine which recordings had a track length of four minutes or more, and another user c
Vikentia [17]

Answer:

In my opinion, the answer is increased flexibility.

Explanation:

When one user performs the query to perform analysis and distribution of recordings as they relate to other categories. This is the advantage of increased flexibility. Data is also flexible in that case because features and variables are recorded before evaluation.

6 0
3 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
2 years ago
Some applications required advanced storage solutions are available to provide fault tolerance and high performance.
katen-ka-za [31]
A. True

This is because not all applications can run with low/small storage.
3 0
3 years ago
The set of instructions given to a computer is called _____________________.
adell [148]

Answer:  c) a program.

Explanation:

A computer, is a hardware device, that differs from those with dedicated hardware (like a TV set, a radio, or an old phone) , in that it can be used for different purposes, due to it's a programmable device.

The way in which the computer is instructed to do anything, is by means of a set of instructions to  be read and executed sequentially, which is called a program.

The set of the different programs stored in the computer is which is known as the computer software.

4 0
3 years ago
Other questions:
  • Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dy
    8·1 answer
  • Which of the following conditions must be met for a language to be a true programming language?
    8·2 answers
  • Help, with gaming unlocked
    12·1 answer
  • How to jailbreak ios 9.2 ? Is there anyway???!!!!
    12·1 answer
  • Select the correct answer.
    9·2 answers
  • IfL = 4.4H and the inductive reactance of an inductor is 620 Omega find the frequency of the alternating current​
    5·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • Plz plz plz help me with me
    14·2 answers
  • What is the importance of shape in graphic design?​
    5·2 answers
  • What type of dns servers field dns queries, send iterative queries to upstream dns servers, or send requests to forwarders and t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!