1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
8

Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is

the most likely problem?
A. Hard drive
B. Microprocessor
C. Motherboard
D. RAM
Computers and Technology
1 answer:
9966 [12]3 years ago
8 0
System crashes, viruses and fragmented file systems are hallmarks of Windows systems, but your teacher is probably looking for Hard Drive for the answer.
You might be interested in
A computer network is best described as two or more computers that are
ANTONII [103]
A computer network is best described as two or more computers that are linked together. 
6 0
3 years ago
What is a commonly publicized password sql injection string?
aleksley [76]
The strings "or 1=1" and ""or ''=''"  can be commonly used to trick an SQL WHERE clause into becoming true.

So if you specify <span>' or ''=' as a password, you can log in if the query string would be:

</span><span>select username,pass from users where username='you' and password='' or ''='<span>' limit 0,1;</span></span>
7 0
4 years ago
Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
ANEK [815]

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

            <u>                                     </u>

1001     | 1001  0001  000

           <u>  1001                             </u>

           <u> 0000  0001             </u>

                        1000

            <u>            1001             </u>

                        0001  000

                             <u>    1 001  </u>

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                <u>                                     </u>

1001         | 1001    0001   001

                <u> 1001                           </u>

                 0000 0001

                       <u>     1001                  </u>

                            1000

                          <u>  1001              </u>

                            0001  001

                    <u>        0001  001      </u>

                                   0000

No error

7 0
3 years ago
Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent o
kolezko [41]

Answer:

One of the  top ethical dilemma is privacy issue.

Explanation:

With advent of I.T., personal data are kept in a digital platform which can be vulnerable to security breach. Hacker or other unauthorized parties can find their way to breach the computer system and steal the private information of the user.

Besides, the users' activities of computer machine can also be tracked. This is often happen in a corporate world where some employers tend to monitor their staffs' work performance through the computer. This can be an offence to the privacy of an individual.

4 0
4 years ago
Fiona is drawing polygons on a computer. She wants to map a regular 9-sided polygon back onto itself using a reflection. Which s
Rus_ich [418]
The answer is "<span>B) any perpendicular bisector of one of the sides".
</span>
We can define a line of reflection as the line in which a shape is reflected, or we can say that it is the mirror in which the shape is reflected. The line of reflection is the perpendicular bisector of any pair of corresponding points. If you want to join sets of corresponding points on the object and image, then the line of reflection will slice the lines framed down the middle.
4 0
3 years ago
Read 2 more answers
Other questions:
  • You have configured a LAN with 25 workstations, three network printers, andtwo servers. The workstations and printers will have
    9·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an GUI
    12·2 answers
  • What does an operating system do?
    11·2 answers
  • Analyze the following code:
    8·1 answer
  • instructor is describing a component that is always located on the CPU and accelerates the processing of instructions. Which com
    12·1 answer
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • Which of the following is NOT an example of application software?
    8·1 answer
  • This is the question
    13·1 answer
  • Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks
    9·1 answer
  • Say yes if you hate edge2021?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!