1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
10

Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t

he error in her statement?
Computers and Technology
1 answer:
abruzzese [7]3 years ago
4 0

Answer:

Her computer is producing thermal energy, not heat.

Explanation:

Shelly informs her friend that she wants to repair her system because it has generated a lot of heat and therefore is smoking. Her device produces thermal energy but not heat because when she's working continuously and her system's CPU inside any blocked area at that time electricity pass through the CPU and blocked inside then it producing the thermal energy.

You might be interested in
The picture that graphically represents the items you use in windows is called a/an
oee [108]
<span>The picture that graphically represents the items you use in windows is called a/an icon.</span>
7 0
4 years ago
What is the difference between a LAN and WAN? how do these two networks interact?​
stealth61 [152]
A LAN, abbreviated from Local Area Network, is a network that covers a small geographical area such as homes, offices, and groups of buildings. Whereas a WAN, abbreviated from Wide Area Network, is a network that covers larger geographical areas that can span the globe.

A Wide Area Network (WAN) operates over a much larger area, as they interconnect LANs to allow them to exchange data.
3 0
3 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
A cloud service provider uses the Internet to deliver a computing environment for developing, running, and managing software app
MakcuM [25]

The answer is PaaS (Platform as a Service)  

PaaS provides users with a cloud runtime environment in which they can develop, test, manage, and deliver applications. Users are able to use a suite of pre-built tools to develop and test their own apps. Thanks to these solutions, developers are able to deploy applications without the need of infrastructures such as servers, operating systems, or development tools.


6 0
3 years ago
Your team has been asked to design a LAN for a very successful CPA firm with five departments in one building and a total of 560
ziro4ka [17]

Answer:

Please find in attachment.

Explanation:

The details in attachment are self explanatory.

Download docx
5 0
3 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • In a cellular network, where does each wireless base station connect to?
    9·1 answer
  • Kak cheat clans royale
    15·1 answer
  • Which one of the following words means most nearly the opposite of RANDOM? (remember,opposite)
    12·1 answer
  • Assume:
    14·1 answer
  • Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
    15·1 answer
  • The major difference between a calculator and a computer, when performing calculations, is that a
    12·1 answer
  • Which of the following is an advantage of computer usage? *
    10·1 answer
  • Components of document merging?
    5·1 answer
  • Question # 9
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!