1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
7

If your computer will not turn on, What is something you can would you use to diagnose the problem?

Computers and Technology
2 answers:
antoniya [11.8K]3 years ago
5 0
<span>1. Check if the monitor is plugged in</span>
inysia [295]3 years ago
3 0
3. See if its plugged in
You might be interested in
When using a calculator be sure to press ____ first.​
matrenka [14]

Answer:

A. C to clear any previous calculations.

hope it helps...

6 0
3 years ago
Read 2 more answers
What is an example of a reputable website
Keith_Richards [23]
A reputable website would be one that you could research online and read about it's history , reviews etc .
4 0
3 years ago
Read 2 more answers
Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to
ehidna [41]

Answer:

Just restart it. It would definitely work.

6 0
3 years ago
Read 2 more answers
On a Linux system it is considered bad manners to create files and folders in the _______________ directory.
guapka [62]

Answer:

Root

Explanation:

Linux is an open source operating system which receives command from the user and communicates with the hardware, and in Linux the root directory is the top level directory that contains all other directory, it is not recommended to create files and folders in  the root directory because the commands the user enters may change files that the operation system may depend on for usage.

5 0
3 years ago
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • Complete the following:_____
    9·1 answer
  • To write on a cd-rw disc, users must have cd-rw software and a cd-rw ____.
    5·1 answer
  • If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the p
    13·1 answer
  • Mirrors on cars exist to____.
    7·2 answers
  • Read the following sentence from an argumentative essay.
    11·1 answer
  • How do optical discs store data? select one:
    15·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;
    8·1 answer
  • In order to detect repeated lines anywhere in the input, myuniq must keep track of all of the lines it has seen as it moves thro
    9·1 answer
  • Why should we not underestimate the widespread of mass media?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!