1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
9

Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit do

cuments. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Since Jack has a Windows system, he can right-click a hard drive icon in File Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
3 0

Answer:

Check button under error checking

Explanation:

Under the Tools tab there are two options:

Error checking and Optimize and defragment drive option.

clicking the check button with administrative permission under error checking option will examine the hard drive for errors.

You might be interested in
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
3 years ago
What does copyright and trademark both have in common
Marina CMI [18]

copyright is the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.  

trade mark is A trademark, trade mark, or trade-mark is a recognizable sign, design, or expression which identifies products or services of a particular source from those of others, although trademarks used to identify services are usually called service marks.

4 0
4 years ago
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
4 years ago
Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, ma
juin [17]

Answer:True

Explanation:

Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence.Data in its raw form does not help managers in reaching their business decisions. In this electronic age data collection has been made simple .However the value of that data can only be seen when it is processed and it becomes information. It can help managers to make quick business decisions that will be used to make come up with important business strategies  .It follows that when data is collected in its various forms it should then be processed meaning that the business managers can either use business Intelligent software  that can present the data in a meaningful form like graphs . pie charts and other forms that can be easily interpreted and reflect the trends that have been presented by the raw data .The organisation should find value in the data that they have collected and tell the story that leaves in the data.

7 0
3 years ago
Which graph or chart shows changes in the value of data?
yKpoI14uk [10]

Answer:

Bar graph and Pie chart

3 0
3 years ago
Read 2 more answers
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • Which phrase describes this image most precisely?
    10·1 answer
  • Can I recover pics I deleted like 9 months ago? ​
    13·2 answers
  • Which of the following could be omitted from a company's AUP? A.Permissible lunchtime online activities B.Employees' home email
    15·2 answers
  • It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
    5·1 answer
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
    14·1 answer
  • Suppose we want to adjust the page numbering for our Works Cited section so that it starts over at page 1. Is this possible to d
    12·2 answers
  • Indicates the beginning and ending of your code written in HTML
    12·1 answer
  • What type of internet connection do you think you'd get in Antarctica?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!