1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
6

A troubleshooting strategy that removes components from a system in order to get back to a basic configuration is called module

replacement.A. TrueB. False
Computers and Technology
1 answer:
Semmy [17]3 years ago
3 0

Answer:

B. False.

Explanation:

Troubleshooting strategy is a technique used to discover the cause of defeat in a system. The technician must learn to improvise with these strategies to solve a system problems.

Module replacement is a type of troubleshooting strategy that replaces a component with unknown status with another component with good status to determine the cause of the problem.

Removing a component from a system to get back to its basic configuration helps to eliminate factors that may make a computer problem difficult to solve.

You might be interested in
HELP PLZZZZZZZZ!!!!!!!!!!!
adelina 88 [10]

Answer:

Its either business format franchise or business brokers

7 0
2 years ago
At age 16 Cheyanne just got her drivers license
ddd [48]

Answer:

i cant tell what you need

Explanation:

that is legal bc 16 is the legal age requirement

8 0
3 years ago
Read 2 more answers
Why you should care about copyright
DochEvi [55]

Copyright protects those words from being used in any form without the author's approval and it can lead to The law provides a range from $200 to $150,000 for each work copyrighted.

5 0
3 years ago
Write a fragment of code that reads in strings from standard input, until end-of-file and prints to standard output the largest
Nady [450]

Answer:

Explanation:

Sample input file: numbers.txt

8 9 7 67 78 45 67 99 1001

Sample Output:

The largest value is:1001

Code to Copy:

// include stdafx, if using visual studio.

#include "stdafx.h"

// declare the necessary header files.

#include <iostream>

#include <string>

#include <fstream>

using namespace std;

// Start the main function

int main()

{

// create the object of ifstream.

ifstream in_file;

// Open the file

in_file.open("numbers.txt");

// Declare the string variable

string str;

// Declare the integer variables.

int maximum = 0;

int num;

// Check whether the file open

if (in_file.is_open())

{

// Traverse the file till the end.

while (!in_file.eof())

{

// traversing the value.

in_file >> str;

// convert the string into integer.

num = stoi(str);

// Check whether value is max or not.

if (maximum < num)

{

// Update the value of maximum.

maximum = num;

}

}

}

// Display the statement on console.

cout << "The largest value is:" << maximum << endl;

// Close the file.

in_file.close();

system("pause");

return 0;

}

8 0
3 years ago
You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
icang [17]

Answer:

Tactic Exchange

Explanation:

The approaching style of the student to his/her friend for help is of an influence categorized as the "Exchange Influence Tactic".

The Exchange Influence Tactic refers to when a person persuades someone or seeks influence over him/her by offering some sort of reward for their help rendered. It might also work by reminding other person of any favor which you offered in the past that should be repaid now.

Here the student is seeking help of his/her friend for completion of a final report for which he/she is already late. In exchange the student is assuring his/her friend the completion of certain spreadsheets which are pending on him/her. Hence, the student has used the exchange tactic to get his work done by offering a favor in response.

3 0
3 years ago
Other questions:
  • Which actions help to protect a computer and keep it running properly? Check all that apply.
    10·1 answer
  • The___provides access to the internet; may also be internal
    11·1 answer
  • The camera still is bad even with the new iPhone xr and especially in low light it is even worst because you can see the pixels
    15·1 answer
  • Which online article citation is correctly formatted according to MLA standards?
    15·2 answers
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
  • PLZ ANSWER QUICKLY!!
    12·1 answer
  • I am booooooored any one want to join
    5·2 answers
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
  • Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all intege
    5·2 answers
  • In which number system do the digital computer work​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!