1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
12

You have just installed a network adapter and have booted up the system, installing the drivers. You open File Explorer on a rem

ote computer and don't see the computer on which you just installed the NIC. What is the first thing you check? The second thing?
Computers and Technology
2 answers:
pashok25 [27]3 years ago
6 0

Answer:

I will check if the lights on the adapter is functioning correctly?

Explanation:

Dafna1 [17]3 years ago
5 0

Answer:

Network indicator light and signal strength.

Explanation:

The computer system is a electronic information technology system with physical and software components.

Its main physical component comprises of input, output, storage and memory, and processing unit, which are configured or made controllable by software device drivers. The network adapter could be a major or peripheral device in a system with a driver. It's functionality is identified by an indicator light and a network icon display on the desktop.

You might be interested in
Hi I need help, This assignment is for Assignment 6 Question 3 in edhesive for computer science. here is the prompt:
miv72 [106K]

Answer: print("THIRD")

for i in range(10):

   for j in range(10-i):

       print(" ", end=" ")

   for j in range(i):

       print("*", end=" ")

   print("")

Explanation:

You're Welcome yall

print("THIRD")

for i in range(10):

   for j in range(10-i):

       print(" ", end=" ")

   for j in range(i):

       print("*", end=" ")

   print("")

6 0
4 years ago
Google uses what strategy for matching web pages to your search request
OleMash [197]
It uses boolean operators and key words to match the correct web pages to the search request.
6 0
3 years ago
Im so stuck bruh helpppppppppp
goblinko [34]

Answer:

24 is the answer hope that helped!

•w•

5 0
3 years ago
Use the arr field and mystery () method below.
kolezko [41]

Answer:

The sum of all positive even values in arr

Explanation:

We have an array named arr holding int values

Inside the method mystery:

Two variables s1 and s2 are initialized as 0

A for loop is created iterating through the arr array. Inside the loop:

num is set to the ith position of the arr (num will hold the each value in arr)

Then, we have an if statement that checks if num is greater than 0 (if it is positive number) and if num mod 2 is equal to 0 (if it is an even number). If these conditions are satisfied, num will be added to the s1 (cumulative sum). If num is less than 0 (if it is a negative number), num will be added to the s2 (cumulative sum).

When the loop is done, the value of s1 and s2 is printed.

As you can see, s1 holds the sum of positive even values in the arr

7 0
3 years ago
Write a program that removes all spaces from the given input.
sasho [114]

Explanation:

#include<iostream>

#include<string.h>

using namespace std;

char *removestring(char str[80])

{

   int i,j,len;

   len = strlen(str);

   for( i = 0; i < len; i++)

   {

       if (str[i] == ' ')

       {

           for (j = i; j < len; j++)

               str[j] = str[j+1];

           len--;

       }

   }

   return str;

}

int main ()

{  

char  str[80];

   cout << "Enter a string : ";

   cin.getline(str, 80);

   strcpy(removestring(str), str);

   cout << "Resultant string : " << str;

   return 0;

}

In this program the input is obtained as an character array using getline(). Then it is passed to the user-defined function, then each character is analyzed and if space is found, then it is not copied.

C++ does not allow to return character array. So Character pointer is returned and the content is copied to the character array using "strcpy()". This is a built in function to copy pointer to array.

5 0
4 years ago
Other questions:
  • At what point in a vulnerability assessment would an attack tree be utilized?
    9·1 answer
  • True or False?
    8·1 answer
  • Before guis became popular, the _______________ interface was the most commonly used.
    15·1 answer
  • What is the difference between dial up and broadband connections?
    15·2 answers
  • Assume you are given a boolean variable named isSquare and a 2-dimensional array that has has been created and assigned to a2d.
    6·1 answer
  • What company uses the most storage?
    15·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comp
    10·1 answer
  • Difference between batabse and database management system
    5·1 answer
  • What are the two methods of creating a folder​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!