1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
12

What happens when your computer is in Hibernate mode?

Computers and Technology
1 answer:
marusya05 [52]3 years ago
8 0
It keeps you logged in to everything but it turns the screen off to save power.
You might be interested in
"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer
ExtremeBDS [4]

Answer:

The Session layer (Layer 5)

Explanation:

The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;

i. Layer 1 or the physical layer

ii. Layer 2 or the data-link layer

iii. Layer 3 or the network layer

iv. Layer 4 or the transport layer

v. Layer 5 or the Session layer

vi. Layer 6 or the presentation layer

vii. Layer 7 or the application layer.

Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.

8 0
3 years ago
Which statement is used to assign value to a variable?
Romashka [77]

Answer:

the "=" sign is used to assign value to a variable. Example:


int number = 25;

You are basically assigning the value '25' to a variable of type 'integer' called 'number'.

Explanation:

3 0
2 years ago
Choose the types of education and iss professional is most likely to have
shutvik [7]

Answer:

A and D

Explanation:

Just took it on edgenuity

8 0
3 years ago
Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
Nuetrik [128]

Answer:

#include<iostream>

#include<stdlib.h>

#include<time.h>

#include <algorithm>

using namespace std;

//main function program start from here

int main(){

   //seed the rand() function

   srand(time(NULL));

   //initialization

   int arr[20];

   //generate the 20 random number

  for(int i=0;i<20;i++){

   arr[i]=rand()%1000;   //store in array

  }

  sort(arr,arr+20); //sort the array by inbuilt function

  cout<<"The sorted array is."<<endl;

  //for display the each element in the array

  for(int i=0;i<20;i++){

   cout<<arr[i]<<endl;

  }

}

Explanation:

Create the main function and declare the array with size 20.

Take a for loop and generate the random number 20 times. For generating a random number, use the function rand();

rand() function which defines in the library stdlib.h, generate the random number within the range.

for example:

rand() % 20: generate the number between 0 to 19 ( Exclude 20).

for generating the random number different for every time, then we have to use srand() function and time function which defines in time.h library.

After that, store the number in the array.

Finally, take another loop and print all elements one by one.  

6 0
3 years ago
What is the effective address generated by the following instructions? Every instruction is
kaheart [24]
D. Mov ax, [bx+si] is your answer
5 0
2 years ago
Other questions:
  • What new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its impo
    7·1 answer
  • What financial behaviors will typically lead to a low credit score?
    14·1 answer
  • Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us
    7·1 answer
  • Can you please help on number 1 and 2?
    13·1 answer
  • What is used to configure data sources for applications that require access to a database?
    14·1 answer
  • What is the subnet mask ?
    9·2 answers
  • is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or av
    6·1 answer
  • What does "CPU" stand for?
    15·2 answers
  • Why is the transmission of information impartial on websites?
    9·1 answer
  • photoshop Curves, photoshop an image and manipulate the curves on a selection of the photo. upload the original photo and The ph
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!