1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
11

A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the p

rogram name for the System Information utility?
Computers and Technology
1 answer:
lisov135 [29]3 years ago
7 0

Answer:

Windows includes a tool called Microsoft System Information (Msinfo32.exe). This tool gathers information about your computer and displays a comprehensive view of your hardware, system components, and software environment, which you can use to diagnose computer issues.

Explanation:

You might be interested in
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
4 years ago
What technique is used when setup times at a workstation are sequence dependent?
grigory [225]

Answer:

johnsons rule minimizes total idle time for both machines or work centers. What technique is used when setup times at a workstation are sequence dependent? determine the total time of each job sequence permutation considering the setup time and choose the best (lowest) time.

Explanation:

please mark me as brainliest thank you

3 0
3 years ago
What is outlook used for?
Arte-miy333 [17]
Outlook is used for mainly emails. It also keeps track of your calendar, has contact and tasks.
4 0
3 years ago
Read 2 more answers
What corrective action should be taken on a printer that prints unknown characters??
Lynna [10]
Reinstall the driver. 
7 0
3 years ago
Which of the following is NOT a safety practice for working near power lines?
dimulka [17.4K]
The answer is use rider posts, when available, to avoid getting too close to the power line. 

I hope this helps!  
5 0
3 years ago
Other questions:
  • What technology allows data to be stored in one place and be retrieved by many systems?
    7·1 answer
  • Does anyone have the GCSE 2018 Design Technology J310/01 practice paper?
    15·1 answer
  • When Gina was 10, she swam in the ocean for the first time. She remembers the feeling of kicking her feet, slicing her arms thro
    12·1 answer
  • Anybody know this question???
    6·1 answer
  • Supporting mobility and smartphone apps is important to MasterCard. What challenges does MasterCard face in rolling out smartpho
    11·1 answer
  • Which of the following aspects of a computer is responsible for making sense of input? processing output memory storage
    14·2 answers
  • This is a tableware use to serve the main dish
    11·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • How many of yall are willing to subscribe to my channel called "Space Juice" with around 245 subs?!​
    8·1 answer
  • Importancia del sistema operativo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!