1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
7

What is one reason to create a study check list​

Computers and Technology
1 answer:
grigory [225]3 years ago
4 0
To make sure you studied everything you need to know.
You might be interested in
A(n) _____ chart is drawn on the same worksheet as the data.
Harrizon [31]
The answer is An embedded chart
6 0
3 years ago
Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac
irina [24]

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

7 0
3 years ago
You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has
posledela

Answer:

Extend a Volume:

1. in the lower left-hand corner, R click the start page thumbnail and select disk management

2. if needed, click ok to initialize any new disks.

3. R click the volume and select extend volume.

4. click next.

5. for the system volume, you can only extend the volume onto the existing disk. type the amount of disk space to add to the volume and click next. click finish.

Convert a Disk to Dynamic

1. In Disk management, R click the disk and select convert to Dynamic Disk

2. Select the disk to convert, click ok.

3. Click convert

4. If the disk contains a volume, you will be shown a warning message. Click Yes to continue.

Create a Spanned Volume

1. In disk management, R click a disk or free space on a disk and select New Spanned Volume.

2. Click Next

3. Select the disks that will be part of the spanned volume and click Add. You must select at least 2 disks to create a spanned volume.

4. To modify the amount of space used on a disk for the new volume, select the disk in the right box, and then edit the number in the select the amount of space in MB: field.

5. Click next

6. Select the drive letter and click Next

7. Type the volume label, then click next

8. Click finish

9. If the new volume includes a space from a disk that is currently a basic disk, you will be prompted to convert the disk to a dynamic disk. Click Yes to create the volume.

Explanation:

5 0
3 years ago
You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used t
Phoenix [80]

Answer:

d. Flash

Explanation:

A flash memory can be defined as an electronic non-volatile memory chip (storage medium) that is typically used on computer systems and other digital devices such as routers, USB flash drives, switches, digital cameras, mp3 players etc. A flash memory is an electronically erasable programmable read only memory (EEPROM) and as such data saved (written) on it can be erased electronically. Also, a flash memory do not require a source of power (electricity) to save or retain data through the use of a floating gate MOSFET (FGMOS) or floating gate transistor.

In this scenario, you are designing an internet router that will need to save it's settings between reboots. The type of memory that should be used to save these settings is a flash memory because it does not require power to write or save data.

8 0
3 years ago
Assume that name is a variable of type String that has been assigned a value.Write an expression whose value is a String contain
zhuklara [117]

Answer:

#read value of name

name=input("Enter name:")

#find and ptint the last character of the string

print("last character of string is:",name[-1])

Explanation:

Read a string from user and assign it to variable "name".Find its last character as "name[-1]". Since name is character array,so name[-1] will give the last character of the array.

Output:

Enter name:Smith                                                                                                          

last character of string is: h

6 0
3 years ago
Other questions:
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • What tool is included with windows 8 that will help you connect to the directaccess server when you have problems and can be use
    6·1 answer
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    6·1 answer
  • Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause
    5·1 answer
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • Cable Internet access can be described with which feature?
    5·2 answers
  • In this image, which feature did we most likely use to quickly change the background, fonts, and layout?
    6·1 answer
  • What are the specifications of mine shaft head gear​
    11·2 answers
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!