1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
15

What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the

operating system?
Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
6 0

The answer is a POST Diagnostic Card.

Although not a necessity, a POST card can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system. To be able to understand how a POST card works, one needs to be very familiar with the BIOS. The power-on self test (POST) is a series of various tests performed by a computer when you turn it on. If you have any issues that conflicts with the operating system and prevents the computer from booting, you can install a POST card in the available expansion slots. This card will monitor the entire boot process and report errors in coded numbers on a small LED panel on the card.  

You might be interested in
What are the characteristics of a good text-based adventure game? In other words, what are some features that should be in the g
Degger [83]

Answer:

spelling and good format

Explanation:thats all i know

8 0
3 years ago
__________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
sergey [27]

<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.

Explanation:

I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.

This Process at times results in  slowing down of the computer  computer considerably.

<u>The combination of RAM and swap files is known as virtual memory.</u>

It is due to the  use of virtual memory that our computer is able to  run more programs than it could run in RAM alone.

4 0
3 years ago
2(x-5)-3(3-x)=1/2(x-2)
lana [24]

you distribute and then combine like terms. x=4 :))

4 0
3 years ago
The movie polar express was critically acclaimed due to the unbelievably lifelike movements of Tom Hanks character
Fed [463]
I think it is greyhound
6 0
3 years ago
True or false which cloud storage you can receive your data anytime from anywhere in the world
Fynjy0 [20]
I think false. depends on where you are certain places you can certain you cant. hope this helps.
8 0
3 years ago
Other questions:
  • Identify the publisher in this citation:Carter,Alan.A guide to Entrepreneurship.New York: River’2008.Print.
    9·1 answer
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • In today's computers, the CPU tells _______________ the clock speed it needs, and the clock chip then automatically adjusts for
    6·1 answer
  • Which is better computer science or software engineering?
    10·2 answers
  • Consider a disk with the following characteristics (these are not parameters of any particular disk unit): block size B 512 byte
    8·1 answer
  • import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in)
    9·1 answer
  • 12. ______ is considered to be the first video game mascot.
    7·1 answer
  • What does the sign (#) mean in manuscript edpm<br> and also what does (DEL)
    15·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!