1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
14

A DESKTOP COMPUTER (NAMED WORKSTATION22) CAN'T CONNECT TO THE NETWORK. A NETWORK CARD WAS PURCHASED WITHOUT DOCUMENTATION OR DRI

VER DISCS. WHICH OF THE FOLLOWING IS THE BEST WAY TO INSTALL NETWORK CARD DRIVER?
COPY THE DRIVER TO A FLASH DRIVE AND INSTALL
Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
8 0

Answer:

Download the driver file from the Internet over another Computer, Copy the driver to a flash or CD and Install it on the Desktop Computer.

Explanation:

Driver files can be easily gotten from software sites online but it is important that the user takes note of the exact model and system architecture to download for.

You might be interested in
What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?
Gennadij [26K]

Answer:

Memory address register

Memory buffer register

Explanation:

In c/c++, the processor consists of mainly five stages.

  • FETCH
  • DECODE
  • EXECUTE
  • MEMORY
  • WRITE BACK    

The memory address (MAR) register is a register where memory locations are being stored and where instructions are being fetched from the memory.

The memory buffer register (MBR) specifically enables the storage of data that are fetched or to be written in the memory.

8 0
3 years ago
Windows 8 has a built-in antivirus program called
MatroZZZ [7]
Its called windows defender.
5 0
3 years ago
What was Ada Lovelace's contribution to computer science?
Alika [10]

Answer:

She made the first computer.

Explanation:

Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.

8 0
2 years ago
Read 2 more answers
3.18: Pizza Pi Joe’s Pizza Palace needs a program to calculate the number of slices a pizza of any size can be divided into. The
alina1380 [7]

Answer:

#program in python.

#variables

slice_area=14.125

pi=3.14159

#read diameter

d=int(input("Enter diameter of pizza:"))

#area of pizza

area=pi*(d/2)*(d/2)

#number of slice

no_slice=int(area/slice_area)

#print slice

print("total silce are:",no_slice)

Explanation:

Declare and initialize a variable "slice_area" with 14.125 which is the area of a pizza slice.Initialize a variable "pi" with 3.14159.Then read the diameter of pizza.Find the area of pizza as "area=pi *d/2*d/2".Divide the total area with area of pizza slice.This will be the number of slice.

Output:

Enter diameter of pizza:20                                                                                                

total silce are: 22

6 0
4 years ago
1.
Umnica [9.8K]

Answer:

B

Explanation:

trust

7 0
3 years ago
Other questions:
  • The following code in a different program is not working properly. The message should display the value of the intCounter variab
    14·1 answer
  • Which of the following is NOT a search engine ( Bing, Yahoo, Ask, Twitter)
    6·2 answers
  • The critical path in a project network is:______ A. The Shortest path through the network. B. Longest path through the network.
    8·1 answer
  • Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a
    14·1 answer
  • A Windows user right-clicks on his desktop. What is he planning to do?
    10·1 answer
  • Rob used Track Changes to suggest changes in Jack's document. Jack agrees with some edits and disagrees with others. What should
    14·1 answer
  • Each generation is set apart from the previous generation because of an innovation.
    6·1 answer
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
  • You have an application running on multiple ec2 instances, however every time an instance fails, your users complain that they l
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!