1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
9

Which event on Earth led to the invention of Newtri?

Computers and Technology
2 answers:
hichkok12 [17]3 years ago
8 0

Answer:

Well, It's not b xD

Explanation:

duh

mamaluj [8]3 years ago
5 0
I think it’s A not sure
You might be interested in
which network component connects a device to transmission media and allows the device to send and receive messages?
krok68 [10]

Answer: Hello!

Network Interface Card (NIC)

Explanation:

Mark me brainest please. Hope I helped! Hope you make an 100%

-Anna♥

5 0
3 years ago
You suspect the hard drive is corrupted. Which window do you open to repair the drive?
vodomira [7]

Answer:

hi!

Explanation:

These are the steps that must be followed to repair the damaged hard drive without formatting and recovering the data:

Step 1: Run Antivirus Scan. Connect the hard drive to a Windows PC and use a reliable antivirus/malware tool to scan the drive or the system.  

Step 2: Run CHKDSK Scan.

Step 3: Run SFC Scan.

Step 4: Use a Data Recovery Tool.

4 0
3 years ago
On a system with paging, a process cannot access memory that it does not own. Why? How could the operating system allow access t
kompoz [17]

Answer:

  • Because the page is not in its page table
  • The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table

Explanation:

On a system with paging, a process cannot access memory that it does not own because the page is not in its page table also the operating system controls the contents of the table,therefore it limits a process of accessing to only the physical pages allocated to the process.

The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table.that way two processes that needs to exchange  data can efficiently do that . i.e creating a very efficient inter-process communication

7 0
3 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Analyze the given word pattern and choose the correct option.
frozen [14]

Answer:

The code for DOOR would be <u>3775</u>.

Explanation:

WORD - 9753

W - 9

O - 7

R - 5

D - 3

DOOR: 3775

5 0
2 years ago
Other questions:
  • 19. Which network topology is a combination of two or more types of physical or two or more types of logical topologies? A. Poin
    8·1 answer
  • A delimiter is used to do which of these? A. Separate two lines of data from each other. B. Separate two fields within a line of
    9·2 answers
  • What does cramming to hand in an assignment
    10·1 answer
  • Why does Linux make use of tasklets (i.e., software interrupts) instead of executing all interrupt-related activity in the (hard
    11·1 answer
  • To complete this assignment you will:
    9·1 answer
  • Which is a primary document?<br> a. letter<br> b. dictionary<br> c. textbook<br> d. website
    11·1 answer
  • The variable named var2 declared above will include an ending NULL character.
    9·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • Pls say correct guyz pls pls pls
    7·1 answer
  • The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!