1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
10

Your friend Suzy calls to ask for help with her computer. She says when she first turns on the computer, she doesn’t hear a spin

ning drive or fan or see indicator lights, and the monitor is blank. Is the problem hardware- or software-related?
Computers and Technology
1 answer:
Tanzania [10]3 years ago
5 0

Answer:

Is the problem of the Suzy's computer is related to a software or a hardware failure?

Explanation:

The problem of the Suzy's computer is related to a hardware problem, because in case of being a software problem, the computer always will turn on the screen, some lights and show at least the Bios charging screen, which in most of The cases will detect and indicate in a message.

in this case the hardware problems can be, for example:

1) A problem with the power source or the battery (in case of being a laptop)

2) A failure on the mainboard, in which case, even having power and having not any other problem the computer will not work, because the mainboard controls all the computer's hardware.

3) A problem in the power button.

4) The power imput cable of the computer is broken.

You might be interested in
3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
andriy [413]

Answer:

a,b,c,d,f,g are true only e is false

6 0
3 years ago
A wireless mesh network with 17 computers would need _______________ connections.
malfutka [58]
Oneeee hundreeeed and thirdy six
4 0
4 years ago
_____ makes source code available for use, modification, and redistribution as long as licensing terms are met. Free and open-so
Andrei [34K]

Answer:

Free and open-source software makes source code available for use, modification, and redistribution as long as licensing terms are met.

Explanation:

Open-source software is software you can find and use for free.

8 0
2 years ago
Elgin is taking notes for his presentation about how people drink too much soda and other sugary drinks, and he finds informatio
slavikrds [6]

Answer:

a solution to the problem

Explanation:

In organizing his text, the move taken by some cities to help their citizens make better choices will fall into the part where he lists or proffers solutions to the excessive intake of soda and sugary drinks by people. Prior to this part, he might begin by explaining what the problem is, and including data that shows the impact of this problem in the society.

When concluding the text, he may now include details of how the government has intervened in remedying the situation.

4 0
3 years ago
Write a for loop that will print the values 1 to 20 while skipping the odd numbers (2,4,6,8,10,12,14,16,18,20):
DochEvi [55]

<u>Answer:</u>

<em>void main ( )  </em>

<em> {  </em>

<em> int counter;  </em>

<em>  cout<<""Even numbers between 1 to 20 are:""<<endl ;  </em>

<em> //Method 1 </em>

<em>  for (counter = 1; counter <= 20; counter++)  </em>

<em>  {  </em>

<em>    if ( counter%2 == 0)  </em>

<em>   {   </em>

<em>     cout<<counter<<""\t""<<endl ;  </em>

<em>   }  </em>

<em>  }  </em>

<em>//Method 2 – simplest one </em>

<em>for (counter = 2; counter <= 20;)  </em>

<em>  {  </em>

<em>     cout<<counter<<""\t""<<endl ;  </em>

<em>counter = counter + 2; </em>

<em>    </em>

<em>  } </em>

<em> </em>

<em>  return 0;  </em>

<em>} </em>

<u>Explanation:</u>

In this, Method 1 runs a for loop and check whether each number is divided by 2. If yes, then printed otherwise it is skipped.

In the second method, it runs for loop only for even numbers. <em>This is obtained by incrementing the counter by 2. </em>

6 0
3 years ago
Other questions:
  • SubVIs...
    15·1 answer
  • If there is more than one speaker, how should they be all noted?
    9·1 answer
  • ________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of the
    5·1 answer
  • As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
    10·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • Major characteristics of the bus in computer architecture​
    8·1 answer
  • Hey guys!
    5·2 answers
  • Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
    8·1 answer
  • Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Pa
    14·2 answers
  • A palindrome is a string whose reversal is identical to the string. how many bit string of length 20 are palindromes and do not
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!