1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
14

*Please* read before answering.

Computers and Technology
1 answer:
almond37 [142]3 years ago
7 0

Answer:

New charging port

Explanation:

The 15-ba051wm laptop you own requires a new charging port, as we can rule out the charger itself. If this solution does not work, it'd have to be the board itself. Thankfully, this replacement is not too expensive, and you can buy it on ebay. Go on ebay and search "DC POWER JACK CABLE HP 15-BA051WM" and choose whichever you deem fit. I personally haven't used this laptop before but a video on replacing the port shouldn't be too hard to find.

You might be interested in
Worksheet-I • Make a list of 10 application software and 5 utility programs installed in your computer, along with their uses. U
Andru [333]

Answer:

An antivirus is a utility software that helps to keep the computer virus-free. Moreover, it notifies when any malicious file is detected and removes such files. In addition, it scans any new device attached to the computer and discards any virus if there. Moreover, it also scans the system from time to time for any threats and disposes of them. Examples of antivirus are McAfee Antivirus, Quick heal Antivirus, Windows Defender, etc.

These utility software are used to manage files of the computer system. Since files are an important part of the system as all the data is stored in the files. Therefore, this utility software help to browse, search, arrange, find information, and quickly preview the files of the system.

An important part of a computer is storage space, it is very important to maintain this storage. Therefore, we use certain utility software to compress big files and decrease their size, these are compression tools. The format of the files changes while compressing and we cannot access or edit them directly. In addition, we can easily decompress the file and get the original file back. Examples of compression tools are WinZip, WinRAR, 7-Zip, etc.

These utility software are used to manage data on disks. Moreover, they perform functions like partitioning devices, manage drives, etc. Examples of disk management tools are Mini Tool Partition Wizard, Paragon Partition Manager, etc.

This utility software helps to free up the disk space. In addition, the files which are no longer in use are removed from the disk. Examples are Cortex, C Cleaner, etc.

Explanation:

hope it helps

mark as brainiest

happy to help

ask more I'll help if I know the answer

8 0
3 years ago
What specific type of DNS query instructs a DNS server to process the query until the server replies with an address that satisf
NeX [460]

Answer: a)Recursive

Explanation: Recursive DNS( Domain Name System) is the server that support the DNS servers in authority.They help in the management of the load that gets produced by the requests from the user. The load  is managed by splitting/distributing so that the website requests becomes supportive and load can be relieved.

Other options are incorrect because they don't revert with the query message   for the DNS servers processing .Thus, the correct option is option(a).

6 0
3 years ago
Dropdown Complete the sentence. To protect a web-based database, you should apply to any online forms that add data to it. princ
sergey [27]

To protect a web-based database, you should apply <u>principle of least privilege</u> to any online forms that add data to it.

<h3>What is principle of least privilege?</h3>

Principle of least privilege is also referred to as the principle of minimal privilege (least authority) and it can be defined as a security concept that involves giving an end user, software program, or process the minimum levels of access or permissions necessary to perform an action in a database.

In this context, a network administrator should apply the <u>principle </u><u>of least </u><u>privilege</u> to any online forms that add data to a web-based database, in order to protect it.

Read more on least privilege here: brainly.com/question/4365850

3 0
3 years ago
Read 2 more answers
What do you think about the argument that word processing reduces the quality of writing?
slava [35]
<span>I believe when you're given a sufficient amount of time you are able to write your thoughts clearly than when you're given a short period of time to answer questions or make an argument on an essay BUT there is a drawback with the tools within the word processing. Word processing comes with a spell check but it does not correct homonyms such as they're, their and there or other homonyms. My experience with word processing is that I always need time to effectively write something and that helps me make less grammatical mistakes when I take my time to write and edit my paper, I guess it all depends on the individual in their writing skills

I hope this helps!
</span>
5 0
4 years ago
What is the language of computers?
myrzilka [38]

<em>Answer:</em>

<em>Computers have language of their own. It is called Binary language. </em>

<em>It’s a very simple language with just 2 symbols – 0 and 1. A computer stores all information in the form of 0’s and 1’s.</em>

3 0
3 years ago
Other questions:
  • When creating a query using the query design command, first you must ____?
    13·1 answer
  • How to create a tender statement in database management?
    5·1 answer
  • How are computers used in producing weather forecasts?
    8·1 answer
  • Describe how computer become <br> in the next 35 year
    5·1 answer
  • A user reports that a workstation is continually rebooting. What can a technician do to stop the rebooting in order to troublesh
    12·1 answer
  • On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way poss
    12·1 answer
  • The mouse pointer becomes different shapes depending on the pointer s location and locations you click on the screen. true false
    6·1 answer
  • Given N lines of input, print the 3rd character from each line as a new line of output. It is guaranteed that each of the n line
    8·1 answer
  • What is bit in computer science? (You must select all correct answers.) Hb. A. A part of a tool, such as a router. Non. B. A bas
    6·2 answers
  • There is a group of 10 people who are ordering pizza. If each person gets 2 slices and each pizza has 5 slices, how many pizzas
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!