1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
6

How do you install an operating system? Answer with full sentences

Computers and Technology
1 answer:
denis23 [38]3 years ago
6 0

Answer:

On Windows. Insert the installation disk or flash drive. Restart your computer. Wait for the computer's first startup screen to appear. Press and hold Del or F2 to enter the BIOS page. Locate the "Boot Order" section. Select the location from which you want to start your computer.

Explanation:

You might be interested in
Alright whoever can answer these the quickest will be marked the brainliest
Levart [38]

The number of pixels displayed on the screen is known as screen resolution.

The coding applied to a text document to change it into an HTML is HTTP

Scripting language for webpages is Javascript.

Hypertext markup language is HTML

The address, or the item that specifies where on the Internet a site can be found is the URL.

--

Hope this helped :)


4 0
3 years ago
By default, the document has a (blank) margin on all four sides
Brut [27]
The normal margin is 1 inch on all sides
6 0
3 years ago
Read 2 more answers
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
16
mihalych1998 [28]

Answer:

Connecting a new computer to the network.

4 0
2 years ago
On which tab can you find the margins button
insens350 [35]
In the tab key you alwAy use that to center
4 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose the m2 money supply is $13 trillion, including: $7 trillion in savings accounts $3 trillion in checking accounts $1 tril
    9·1 answer
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • The _____ dialog box lets you specify which files are to be merged.
    14·1 answer
  • Match the metric units with these measurements
    8·1 answer
  • An elevator of mass 250kg is carrying two persons whose masses are 50kg and 100kg. if the force exerted by the motor is 3000N. C
    12·1 answer
  • The number of pixels displayed on the screen is known as ________.
    13·1 answer
  • "what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
    13·1 answer
  • What is the best wi-fi name you have ever seen?
    10·1 answer
  • A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are
    12·1 answer
  • Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction stor
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!