1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
12

1. You have recently been hired by a leading firm, which provides information management solutions to large corporations. As a n

ew employee you have been issued a new computer, which you will use to conduct your work. In an effort to keep your new computer running efficiently, you have been asked by your employer to create a maintenance schedule. Your performance will be measured on your ability to create and implement this schedule.
2. Conduct an Internet search to locate sample computer maintenance schedules. Using the information you learned in the Maintaining Windows lesson and the sample maintenance schedules, create a maintenance schedule you will use on your new computer. The maintenance schedule should contain the following:
a. A list of maintenance tasks to be completed daily
b. A list of maintenance tasks to be completed weekly
c. A list of maintenance tasks to be completed monthly
d. A list of maintenance tasks to be completed annually
Computers and Technology
2 answers:
NikAS [45]3 years ago
7 0
It has to be a cus why not check it every single day
Tema [17]3 years ago
7 0

Answer:

y u ask

Explanation:

You might be interested in
When you ____ software, you are adapting it from one type of computer or operating system to run on a different computer or oper
ra1l [238]

Answer: Port

Explanation :

When we port a software from one computer to another computer or from one operating system to another operating system, it tries to adapt to the new environment of the machine by checking the required the configurations of the machine and then checking the available files in the software to run the machine.

The porting of a software also checks whether the software is compatible with the machine or not and if not then why.

7 0
3 years ago
चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
Kruka [31]

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

7 0
2 years ago
If you want to open an application that does not have a tile pinned to the start menu
guapka [62]
Search for it in the start menu. Once you find it, right click and press "Pin to taskbar."
6 0
3 years ago
Which bug type would you suggest for the following bug? The button label "Add to cart" is not fully visible.
harina [27]
Butterfly one I forgot the name metapods evolution
3 0
3 years ago
Find the double word-length 2's complement representation of each of the following decimal numbers:a. 3874
miss Akunina [59]

Answer:

-3874₁₀ = 1111 1111 1111 1111 1111 1111 1101 1110₂

Explanation:

2's complement is a way for us to represent negative numbers in binary.

To get 2's complement:

1. Invert all the bits

2. Add 1 to the inverted bits

Summary: 2's complement = -N = ~N + 1

1. Inverting the number

3874₁₀ = 1111 0010 0010₂

~3874₁₀ = 0000 1101 1101₂

2. Add 1 to your inverted bits

~3874₁₀ + 1 = 0000 1101 1101₂ + 1

= 0000 1101 1110₂

You can pad the most signigicant bits with 1's if you're planning on using more bits.

so,

12 bits                          16 bits

0000 1101 1110₂  = 1111 0000 1101 1110₂

They asked for double word-length (a fancy term for 32-bits), so pad the left-most side with 1s' until you get a total of 32 bits.

           32 bits

= 1111 1111 1111 1111 1111 1111 1101 1110

7 0
3 years ago
Other questions:
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a check
    9·1 answer
  • State whether true or false.
    6·1 answer
  • Tribology is a branch of physics concerned with friction in mechanical motion. Knowledge of tribology would be useful working wi
    14·1 answer
  • . Which of the following is NOT a valid declaration for a character string?
    6·1 answer
  • What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem usi
    14·1 answer
  • Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between li
    8·1 answer
  • Write a program that computes how much each person in a group needs to pay (after tax and tip) when splitting the bill equally.
    5·1 answer
  • Which of the following is the file type of Microsoft® Publisher files?
    12·2 answers
  • A network of computers that provides access to information on the web.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!