1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
10

What to do when you strip a screw

Computers and Technology
2 answers:
Georgia [21]3 years ago
7 0
In order to go about this situation, you would need to keep the stripped screw and find a larger or smaller screw driver head OR use a flat head screwdriver to see if it will catch some part of the stripped screw.

I hope this is the answer you were looking for and that it helps!! :)
PtichkaEL [24]3 years ago
7 0
Use different screwdriver or try slightly smaller or larger head sizes then a flat head screwdriver to get it catched on some part of the stripped screw
You might be interested in
Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
BigorU [14]

Answer:

c.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

Explanation:

Primary VLANs which can only be reached by using promiscuous port, comprises of the gateway and isolated VLANs for users to get out of a network.

The isolated ports can only communicate i.e send and receive data with the promiscuous ports; Fa3/34 and Fa3/35.

Also, WS_1 and WS_2 can neither send nor receive data with the data server, thus we isolate them.

3 0
4 years ago
Ingrid started speaking about her slide presentation. When she clicked to th
german

Answer: B add presenters notes

8 0
3 years ago
Read 2 more answers
What are the careers needed to create a video game? Name all the careers involved please.
AURORKA [14]
Audio Engineers
Interpreters and Translators
Video Game Testers
Technical Support Specialists
Marketing Managers
Market Research Analysts
Sales Representatives

6 0
3 years ago
Write chracteristics of all 5 generation of computer​
jeka94

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

3 0
3 years ago
Read 2 more answers
Under normal operations, cisco recommends that you configure switch ports on which vlan
larisa86 [58]

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





3 0
3 years ago
Other questions:
  • If you only use part of a quotation, it is not necessary to include a citation
    6·1 answer
  • A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
    9·1 answer
  • Which type of financial institution typically has membership requirements?
    11·1 answer
  • What do you think is the meaning of the saying "Sticks and stones may break my bones, but words can never hurt me"? Do think tha
    5·1 answer
  • Why is it a good idea to defrag your hard disk regularly?
    9·1 answer
  • In which stage of investigation does a digital forensics expert perform self-assessment?
    11·2 answers
  • How much memory will be occupied by black and white image​
    8·2 answers
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • What is the fundamental purpose of sentiment analysis on social media?​
    9·1 answer
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!