1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
13

What can become lost or damaged on a computer and prevent it from working correctly?

Computers and Technology
2 answers:
Iteru [2.4K]3 years ago
7 0
A broken fan can be a common issue that can be detrimental to a computer. Also, overheating a GPU is a common issue for 3D rendering and gamers.
Ann [662]3 years ago
7 0

Answer:

The correct answer is: DLL Files.

Explanation:

The DLL files, abbreviated by their name in English Dynamic Link Library, known in Spanish as Dynamic Link Libraries, consist of a series of files consisting of executable code and other parts of an app, which make it possible to use the applications that we have installed on the PC.

When we order our team to execute a program, without our noticing, the operating system automatically loads the corresponding DLL library so that the application or function included in the app is executed.

One of the most important advantages that DLL files or dynamic link libraries offer us, is that thanks to their implementation, the size of the executable files of the applications has been significantly reduced, since a large portion of the executable codes of the Programs can be stored in these DLL files, such as graphics, audio, text, typography and all other elements used by the app, so that a greater organization of processes is obtained, which results in better performance of the app, and therefore the overall performance of the computer.

However, DLL files also offer other very interesting advantages, more related to the overall performance of the PC, since for example, many times the same dynamic link library or DLL can be used by different programs, such as In the case of the so-called MFC, they usually use a large number of applications that run on the Windows operating system.

DLL files also allow you to increase memory utilization and facilitate management through the application of certain algorithms that help improve operating system performance and increase speed during the execution of applications that use the same DLL libraries, since that have been loaded before.

You might be interested in
Explain LCD and give two example​
Pani-rosa [81]

Answer:

LCD means least common denominator• a "Common Denominator" is when the bottom number is the same for the fractions.

Explanation:

3 0
3 years ago
Read 2 more answers
A construction-based client would like to develop an application that can analyze an image of machinery and overlay information
Elden [556K]

A form of Extended Reality which can best assist the client with information on the repair is: 3. Augmented Reality.

<h3>What is Extended Reality?</h3>

Extended reality refers to an umbrella terminology that is used to describe all real and virtual physical environments (realities) and human-machine interactions through the use of computer technologies and wearables.

<h3>The forms of Extended Reality.</h3>

In Computer technology, there are four (4) main types of Extended Reality and these include:

  • Mixed Reality
  • Haptic Reality
  • Virtual Reality
  • Augmented Reality

Augmented Reality is mainly applied in maintenance and repair by analyzing an image of machineries and provide information that will assist in the repair process.

Read more on Augmented Reality here: brainly.com/question/9054673

4 0
3 years ago
A device that does not work well in a system can sometimes be improved by updating its ___computer ____________.
Semenov [28]
I believe its "By updating its computer driver i know its not software im pretty sure its a driver because all the components in a comuter have a specific driver and they need to be mainitanced yearly. P.s Glad to help you.
5 0
3 years ago
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
Write a for loop that displays your name and student number 12 times.
d1i1m1o1n [39]

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object

       Scanner s=new Scanner(System.in);

        // variables

      String s_name;

      int s_num;

      System.out.print("Please enter the name:");

       // read the student name

      s_name=s.nextLine();

      System.out.print("Please enter the number:");

       // read the student number

      s_num=s.nextInt();

       // print name and number 12 times

      for(int i=0;i<12;i++)

      {

          System.out.println(s_name+"----"+s_num);

      }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Create a scanner class object to read input from user.Read the student name and the number from user and assign them to variable "s_name" and "s_num".Print the student name and number 12 times with the help of for loop.

Output:

Please enter the name:Mary Kaur

Please enter the number:123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

5 0
4 years ago
Other questions:
  • The best-known communications protocol is probably smtp, which regulates internet data transport. _________________________
    6·1 answer
  • An administrator needs to make sure that video conferencing is allocated a high portion of bandwidth within a company network. W
    11·1 answer
  • Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. suppose all of the interfaces in each of t
    11·2 answers
  • _________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compati
    12·1 answer
  • What does it mean to empty the cache?
    6·1 answer
  • Ba esti prost?<br> Ba esti nebun?<br> Ce ai?
    5·2 answers
  • Complete the sentence.
    8·2 answers
  • Can you answer this question?
    9·1 answer
  • Which slideshows design can not be use?
    12·1 answer
  • A citizen of any group has both _____ and _____.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!