1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
7

What is the difference between Sleep and Shut Down?

Computers and Technology
1 answer:
OleMash [197]3 years ago
3 0

Answer:

When you shut down your PC, all your open programs close and the PC shuts down your operating system. but In sleep mode, the PC enters a low-power state. The PC's state is kept in memory, but other parts of the PC are shut down and won't use any power.

Explanation:

You might be interested in
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Komok [63]

Answer: Layer 3

Explanation:

The layer 3 in OSI model is the network layer which is responsible for routing the packet across the network.

So we need a switch and a router for the LAN and WAN connection and both of them has to support the same protocols at layer 3.

3 0
3 years ago
Which era marked a switch from agricultural practices to industrial practices?
sashaice [31]

The Industrial Revolution is the era that is marked a switch from agricultural practices to industrial practices.

<h3>What was the Inductrial revolution?</h3>

The Industrial revolution is the transition period between 1820 to 1840. The era was the development of new industries and manufacturing of products and goods in Great Britain.

Thus, the Industrial Revolution is the era that is marked a switch from agricultural practices to industrial practices.

Learn more about Inductrial revolution

brainly.com/question/1617908

#SPJ1

7 0
2 years ago
You are attempting to gather information about a client's network, and are surveying a company site. Access is gained via secure
olga55 [171]

Answer:

Tailgating

Explanation:

Tailgating refers basically to an attacker seeking entry to a restricted area, where access is unattended or controlled by electronic access control. He/she can simply walk in behind a person who has legitimate access.

5 0
3 years ago
Explain the schema to be followed when solving a dp problem
melisa1 [442]

Answer:

Every Dynamic Programming problem has a schema to be followed: Show that the problem can be broken down into optimal sub-problems. Recursively define the value of the solution by expressing it in terms of optimal solutions for smaller sub-problems. Compute the value of the optimal solution in bottom-up fashion.

6 0
3 years ago
Is it ethical to purchase an item that you have every intention of returning
notka56 [123]
<span>It depends on your intent.

If you bought it intending to keep it, but upon using it for a few days discovered that it was defective, didn't function as advertised, or is not fit for purpose, no. That's a valid reason to return it and request that the situation be made right, and you had to try using it to find that out.

If you bought it with full knowledge that you intend to "borrow" and return it, yes. If you only need something for a short time, look for someone you can borrow or rent one from. Yes, that might be a little more effort, and it might actually cost something, but it's the right thing to do. With that practice, the store is losing money on the "open box" item, and essentially, every other customer there is now paying for whatever you were doing. And because of you, people with valid reasons to return something have to fight over "restocking fees" and the like.</span>
3 0
3 years ago
Other questions:
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • What determines the value of an item
    7·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • reading is important blank areas of life A in very few B in many C only in academic D only in career​
    10·1 answer
  • Which of the following is not a responsibility of a member of society?
    14·1 answer
  • Gloria is adding footers to a PowerPoint template for students to use in a literature class. Each student must choose an author
    13·2 answers
  • Write a program that uses a custom function to return the cost of purchasing an item, possibly in multiple quantities. The item
    14·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • Ten(10) examples of wearables or wearable technologies?​
    6·1 answer
  • Choose which statement is wrong by applying your knowledge from the reading. a. A security manager works on tasks identified by
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!