1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
10

Why does my hp computer keep freezing when i move it?

Computers and Technology
1 answer:
ehidna [41]3 years ago
3 0
There is probably a loose or broken cable, most likely connected to the hard drive
You might be interested in
A database stores a large amount data in vertical ___
myrzilka [38]

Records for the first one and table for the second one

4 0
3 years ago
Which of the following office online apps is most effective for creating multi media presentation
Brrunno [24]
Google slides is the best out there
3 0
3 years ago
Read 2 more answers
Makes it possible to distribute both power and data using ethernet cabling. select one:
Nimfa-mama [501]
It would be: 

b.) poe cable 

message me on my profile if you need any more help! :) 
6 0
3 years ago
I am getting two expected errors on this code for the bottom two “public static void” lines. Can someone tell me how I can fix i
AVprozaik [17]

Answer:

Declare variable b in both lines

i.e. int b

Explanation:

In the given code, the parameters of both functions were not properly declared.

When listing the parameters, the data type must be clearly stated for all parameters (individually)

In the declaration of both functions, only variable a is declared as integer while b is undeclared.

So, the correction is to declare b as integer

7 0
2 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
3 years ago
Other questions:
  • what is a massive online storage that allows for access by any Internet connected device running a web browser and is used for l
    7·1 answer
  • What error, if any, is in the following code?
    11·1 answer
  • What makes for a good algorithm compatibility complexity humor correctness efficiency?
    11·1 answer
  • Is it possible to uninstall a program that's on your phone from computer?
    8·1 answer
  • Plzzz help! It’s due soon and I can’t figure it out
    13·1 answer
  • If we compare the push function of the stack with the insertFirst function for general lists, we see that the algorithms to impl
    9·1 answer
  • [1] Please find all the candidate keys and the primary key (or composite primary key) Candidate Key: _______________________ Pri
    6·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Who developed the first triage-like system for Napoleon's ar
    15·1 answer
  • I need help with humans need not apply for codeing
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!