1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
7

What is the difference between Sleep and Shut Down?

Computers and Technology
1 answer:
OleMash [197]3 years ago
3 0

Answer:

When you shut down your PC, all your open programs close and the PC shuts down your operating system. but In sleep mode, the PC enters a low-power state. The PC's state is kept in memory, but other parts of the PC are shut down and won't use any power.

Explanation:

You might be interested in
A _____ is a predefined text format that includes multiple formatting options.
VladimirAG [237]
A style is a predefined text format that includes multiple formatting options.
7 0
3 years ago
Select the best answer to the following question.
Fittoniya [83]

Answer:

I think its called "cloud computing"

8 0
3 years ago
What caused accident? into passive voice​
lozanna [386]
Accident was caused by what
6 0
3 years ago
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
My dog peed in the house last week
Solnce55 [7]

Answer:

my dog chewed up the couch

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • considering that two variables counters and accumulators are important in loop design. What would be their purpose?
    9·1 answer
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
    11·1 answer
  • How to connect xbox one controller
    5·1 answer
  • Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
    11·1 answer
  • Many of the first photographers were actullay scientists and inventors
    11·1 answer
  • Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.
    9·1 answer
  • Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a
    15·1 answer
  • How many types of sharing of Google Forms are possible?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!