1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
12

What command will unregister a component when run?

Computers and Technology
2 answers:
Advocard [28]3 years ago
7 0
<span>Regsvr32.exe/u will unregister a component when run. Regsvr32.exe/u is a utility tool that is installed on Windows Xp or later versions of Windows. It has a 32-bit version and 64-bit version which can be found in the system root folder on a computer. It is capable of unregistering servers.</span>
kkurt [141]3 years ago
7 0
What component are you tying to unregister and on what type of computer

You might be interested in
Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
mars1129 [50]

Answer:

I think it is email or password

3 0
2 years ago
Distinguish between weighted codes and non weighted codes​
Gnom [1K]

Answer:

In weighted codes, each digit is a assigned a specific weight according to its position. NON- WEIGHTED CODE - The Non - Weighted Code are not positionally weighted. In other words, codes that are not assigned with any weight to each digit position. Hope it helpful U.

8 0
3 years ago
Which interface element of a presentation program will enable Ben to see the slide number, design template, and the page style o
kicyunya [14]

B menu bar is correct.

7 0
3 years ago
Read 2 more answers
The _____ of the Open Systems Interconnection (OSI) modelspecifies the electrical connections between computers and the transmis
SVETLANKA909090 [29]

Answer:

"Physical layer" is the correct answer.

Explanation:

  • It dealt mostly with bit-level transfer across various equipment as well as it provides industrial automation connections to meet quality standards to something like digital downloads.
  • The purpose of this layer would be to consolidate essential networking system compatibility so that information is being sent successfully.

Thus, the above is the correct answer.

5 0
2 years ago
Should you let your computer scan email attachments before opening them? Why?
NISA [10]
Jjsjskskiakskskakksjakakoa
8 0
3 years ago
Read 2 more answers
Other questions:
  • Ramona enjoys her job because she is able to help kids in an after school program. The work value Ramona feels strongest about i
    5·2 answers
  • The ____ command will confirm the system directory that you are currently in
    13·1 answer
  • While the zyLab platform can be used without training, a bit of training may help some students avoid common issues. The assignm
    6·1 answer
  • An online journal or diary you create to share your thoughts, opinions and personal news is referred to
    13·1 answer
  • Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security
    5·1 answer
  • Depending on your web browser, you may be able to locate a folder or a file on your machine that contains cookies. Look through
    7·1 answer
  • Assume that d is a double variable. Write an if statement that assigns d to the int variable i if the value in d is not larger t
    13·1 answer
  • How can you send and share a message information through a phone​
    14·2 answers
  • Short notes on primary key​
    6·1 answer
  • A(n) Blank______ database management system allows users to create, read, update, and delete data in a relational database. Mult
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!