1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
3 years ago
7

What should you do when an error message pops up on the screen?

Computers and Technology
2 answers:
BARSIC [14]3 years ago
7 0
What I usaly do is let my computer cool down for a bit but I would also wright down the error code and look it up later after the computer cooled down. so either C or D 
gladu [14]3 years ago
5 0
D.) Write down the error message and research the cause based on the message.
You might be interested in
Which two statements are true regarding the user exec mode? (choose two.)?
likoan [24]
<span>Global configuration mode can be accessed by entering the enable command.</span><span>
The device prompt for this mode ends with the ">" symbol.</span>
8 0
4 years ago
In which ways can governments manipulate the media? Select 3 options.
olga_2 [115]

The three ways by which government can manipulate the media are given below:

  • By prosecuting journalists.
  • By restricting the free press.
  • By damaging media credibility.

Thus, the correct options are A, D, and E.

<h3>What is Media?</h3>

In journalism, media may be defined as a means of mass communication that delivers information through newspapers, radio, television, magazines, and internet sources.

Government possesses immense control over media, but things are gradual changes and now media can be considered the fourth pillar of the nation.

Still, the government can manipulate the media according to the requirement of the nation, states, and community.

Therefore, it is well described above.

To learn more about Media, refer to the link:

brainly.com/question/3653791

#SPJ1

6 0
2 years ago
In java write a program:A contact list is a place where you can store a specific contact with other associated information such
BigorU [14]

Answer:

import java.util.Scanner;

public class ContactInformation

{

public static String GetPhoneNumber(String[] nameVec, String[] phoneNumberVec, String contactName, int arraySize)  

{  

for(int i=0;i<arraySize;i++)

{

if(nameVec[i].equals(contactName))  

return phoneNumberVec[i];

}  

return "Contact doesn't exists!";

}

public static void main(String[] args)

{

int records;

Scanner sc = new Scanner(System.in);

System.out.print("Enter the size of contact List :");

records=sc.nextInt();

String[] contactNameList=new String[records];

String[] phoneNumberList=new String[records];

String contactName;

System.out.println("Enter the contact name and phone number :");

for(int i=0;i<contactNameList.length;i++)

{  

contactNameList[i]=sc.next();  

phoneNumberList[i]=sc.next();  

}  

System.out.println("Enter the name of the contact to be searched :");  

contactName=sc.next();

System.out.println(GetPhoneNumber(contactNameList,phoneNumberList,contactName,records));  

}  

}

Explanation:

In the following the function defined above for getting the contact

number on the basis of contact number provided we are checking the contact name list if we are able to find the contact name and if we did we return the contact number on the same index from the contact number list

which we found in the contact name list.

4 0
3 years ago
Pleas help I will give brainiest
stellarik [79]
1) A
2)D
3)C
4)A
5)D
Hope this will help u
5 0
3 years ago
Read 2 more answers
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another compu
svetoff [14.1K]

Answer:

B)tracert

Explanation:

Tracery Command can be regarded as

network diagnostic tool, it is used in tracking process of pathway of packet ranging from source to destination on IP network. It as well allows to know real time of each hops that are been taken by a packet as it enroutes to it's destination. The traceroute can be run by following these steps:

✓Open the run window

✓Open Command prompt, this can be done by enter "cmd" then enter.

✓ input" tracert" then destination ( Ip address or web address)

It should be noted that Tracery command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer.

6 0
3 years ago
Other questions:
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • WILL GIVE BRAINLIEST! I'm doing a project at school. Does anyone have any good explanations for Digital Art? I need it to be at
    13·2 answers
  • A network administrator has been creating a baseline of network performance. During this process, he realizes that one router is
    14·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Write a program that deliberately contains an endless or infinite while loop. The loop should generate multiplication questions
    13·1 answer
  • If you give an actual answer I'll give brainliest​
    13·2 answers
  • What tasks should a laptop accomplish?
    15·1 answer
  • What does good time management mean​
    8·2 answers
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!