1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
7

When a computer is booted the checks the computer's components?

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
8 0
<span>When a computer is booted the checks the computer's components. No, </span>power-on self test (POST) checks the computers components. The OS will check for the OS errors and attached device functionality like printers/scanners/camera, availability of the network, mapped drives, etc.
You might be interested in
What is a Slide Master?
mafiozo [28]

The correct answer is c. the default design template in a presentation program for Plato. Hope this helps :)

8 0
4 years ago
Read 2 more answers
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Create a flowchart to print numbers from 1 to 100
Mkey [24]

Answer:

brainliest plsss

Explanation:

I think so this is what you had asked!!!!!!

hope it helps

4 0
3 years ago
g Q 2 Suppose I need a data structure having the following characteristics: a) must be very space efficient, and b) I have a goo
SIZIF [17.4K]

Explanation:

a.I would choose an advanced data structure like  dispersion tables.

Scatter tables, better known as hash tables, are one of the most frequently used data structures. To get an initial idea, scatter tables make it possible to have a structure that relates a key to a value, such as a dictionary. Internally, the scatter tables are an array. Each of the array positions can contain none, one or more dictionary entries.

It will normally contain a maximum of one, which allows quick access to the elements, avoiding a search in most cases. To know at which position in the array to search or insert a key, a scatter function is used. A scatter function relates each key to an integer value. Two equal keys must have the same dispersion value, also called a hash value, but two different keys can have the same dispersion value, which would cause a collision.

B. If I eliminated the characteristic b, a possible candidate keeping the previous characteristics would be: Balanced binary trees

Balanced binary trees are data structures that store key-data pairs, in an orderly way according to the keys, and allow quick access to the data, given a particular key, and to go through all the elements in order.

They are appropriate for large amounts of information and have less overhead than a scatter table, although the access time is of greater computational complexity.

Although the storage form has a tree structure internally, this is not externalized in the API, making the handling of the data transparent. They are called balanced because, each time they are modified, the branches are rebalanced in such a way that the height of the tree is as low as possible, thus shortening the average time of access to the data.

5 0
3 years ago
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
4 years ago
Other questions:
  • Which three of the following are requirements for receiving federal financial aid for college education?
    14·2 answers
  • What is one important feature of an AUP?
    14·1 answer
  • Help me!!!!! This is the last question! HELP ME! I REPEAT: HELP ME!!!! I AM SO IN NEED!!!
    12·2 answers
  • Question 8 :You are currently editing a Web document in a GUI HTML editor. You want to specify a background color for the page.
    14·1 answer
  • Sandra wants to have her new technology up and running as soon as possible. She is looking for a tool that she can
    8·1 answer
  • A predictive data analyst ___
    11·1 answer
  • How can I get answers on Collage Board for AP classes when using the inspect element? (AP WORLD HISTORY)
    13·1 answer
  • Look at (d), is it accurate? ​
    9·2 answers
  • Is the color grade of black or white higher?
    11·2 answers
  • 22. (a) List two arithmetic
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!