1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
14

You start up your laptop while getting a coffee across the room. You hear the usual chimes and doinks as it starts up. When you

get to the machine although everything sounds OK there is no display. You were giving presentations yesterday. What do you check first?
A. Sleep mode
B. Brightness
C. LCD toggle
D. All of these
Computers and Technology
2 answers:
Vika [28.1K]3 years ago
7 0

Answer:  C) LCD toggle

Explanation:  

  • LCD(Liquid crystal display) toggle is switching mechanism of LCD when present setting changes to another setting.The toggle switching can be present in two states that is display state and no display/blank state.
  • According to the mentioned situation,Laptop's display might have got toggled after yesterday's presentation.The switching has changed the blank display settings, therefore no display is present due to LCD toggle even after logging in.LCD toggle should be checked firstly.
  • Other options are incorrect because even if brightness is low, display is slightly visible.Sleep mode is state of power saving where application tend to slow the working to save power.
  • Thus, the correct option is option(C).
jek_recluse [69]3 years ago
5 0

Answer:

D

all of the above!

You might be interested in
Asking yourself questions can help you think of what to _____, in order to get answers.
Olenka [21]
Ask your self questions can help you think of what to measure, in order to get answers.
8 0
4 years ago
Fill in the sentences with the correct terms.
ololo11 [35]
<h2>[+] Hello ! [+]</h2>

Answer:

<em>Cells provide data to another cell. </em>

<em>Cells rely on the value of another cell. </em>

Explanation:

  • I hope this helped
  • Tell me if it's wrong
  • Thanks for your time
  • Brainliest is always appreciated!!
  • Have a wonderful and blessed day :D
5 0
3 years ago
Read 2 more answers
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
goldenfox [79]

Answer:

To execute a prepared SQL statement, you can use the bindValue

Explanation:

In PHP, the bindValue () function is inbuilt and can be used to bind values and variables to a parameter, hence it is more versatile. In SQL, the bindValue () function ties value to question mark placeholder or corresponding named in order to adequately get the statement ready.

7 0
3 years ago
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
BabaBlast [244]

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

5 0
3 years ago
Other questions:
  • What piece of software tells the operating system how to use a specific hardware device?
    14·1 answer
  • Middleware is software used to: a. connect processes running on different computer systems across a network. b. integrate a comp
    8·1 answer
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • What does the word “Gacha” come from??????
    5·2 answers
  • Write a fragment of code that reads in integers from standard input, until end-of-file and sends their (floating point) average
    14·1 answer
  • Does this look anywhere close to the APA Format?
    6·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • _____ selectors are used to select elements based on elements that are adjacent to them in the document hierarchy.
    9·1 answer
  • 16. The Nintendo Entertainment System (NES) saw its sales skyrocket as a result of the launch of which of the following games?
    14·1 answer
  • Most computers include a network card designed to connect a computer to the net using standard telephone service. True or False?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!