1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
9

What is the purpose of the boot loader during the bootup process

Computers and Technology
2 answers:
polet [3.4K]3 years ago
7 0

A boot loader is a type of program that loads and starts the boot time tasks and processes of an operating system or the computer system. It enables loading the operating system within the computer memory when a computer is started or booted up. A boot loader is also known as a boot manager or bootstrap loader.

earnstyle [38]3 years ago
6 0
To start up windows and boot the system to make sure no hackers or viruses are on windows so your computer does not get infected with a hacker or virus 

hope this helps 
You might be interested in
this weekend you areplanning to complete part of your assignment at the library to do this you need to store data on a removable
Archy [21]
A flash drive, it can be put into a USB port and the computer will register it and you should be able to pull up anything you store on it on a another computer or device you are using.

4 0
3 years ago
Do you think EA sports should add more tape jobs to the game? (Game is nhl22)
wariber [46]

Answer:

yes

Explanation:

7 0
2 years ago
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
serious [3.7K]

Answer: c

Explanation:

only reasonable answer

7 0
3 years ago
To join a social network you create an avatar true or false
svp [43]
False because not all social media webstites provide avatars
7 0
3 years ago
Read 2 more answers
____ software is used to block unwanted e-mail and is available at many levels.
Anika [276]
Anti-spam <span>software is used to block unwanted e-mail and is available at many levels.</span>
3 0
3 years ago
Other questions:
  • A plan that outlines the steps and timeline for reaching a certain goal is called a(n):
    13·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    11·1 answer
  • Question 5
    5·1 answer
  • What is the main storage location of a computer
    13·1 answer
  • 4+4 act quick for brainliest
    10·2 answers
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·1 answer
  • PLEASE HELP! :)
    14·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!