1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
5

Thomas came into work this morning and turned on his computer and nothing happened. He immediately called the help desk, and you

were sent to fix his computer. While talking with Thomas about his computer, you find out that when he turns on the computer, he has lights and fans, but nothing else happens. He also tells you that nobody else has done anything with his computer. Nothing has been added or changed, since it worked the day before. You decide to try to re-create the problem, and when you turn on the computer, there are lights and fans, but no beeps and no video. You notice that the keyboard light does not come on. What can you determine about the problem with Thomas’s computer? (Select all that apply.) A. Motherboard has failed.
B. Video card is not working properly.
C. Processor has gone bad or is not seated properly.
D. Power supply is not working properly.
Computers and Technology
1 answer:
LenKa [72]3 years ago
8 0

Answer:

A. Motherboard has failed.

C. Processor has gone bad or is not seated properly.

Explanation:

The computer system is a digital or electronic device, which comprises of an input device, output device, memory and storage device and a processor, all controlled by a software interface known as the operating system.

The hardware and software components are all integrated on a printed board known as a motherboard.

When the motherboard is faulty, the system looses it functionality and the screen stays off but the power supply indicator light stays on. This is also the same for the processor.

You might be interested in
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
seropon [69]

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

8 0
3 years ago
A keyboard shortcut to pasting in a document is to key _____.
m_a_m_a [10]
(Ctrl + V) is the shortcut for pasting.

Similarly, (Ctrl + C) is the shortcut for copying.
6 0
3 years ago
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same p
andrew11 [14]
<span>If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it.  This is this known as </span>processor affinity. 
4 0
3 years ago
How do i transfer contacts from one phone to another?
Papessa [141]
You will need both phones for this process  ,
 things you'll need
-2 phones the old phone and the new phone
- a brain
-fingers

how to process
- first get the old phone and send the messages  with all the contact numbers u need or want on the new phone and you will need to tell all of the people who u have contacts with that u got a new phone
have them put you in their contacts   
that's how u transfer contacts from one phone to another phone
8 0
3 years ago
Other questions:
  • What is an advantage and disadvantage to file compression
    8·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • A user who enters americanbank.net into a web browser instead of the correct americanbank and is then taken to a fake look-alike
    11·2 answers
  • Everytime my daughter tries to ask for an app, or a money thing inside an app.. The request won't go through. Anybody know how t
    12·1 answer
  • How can I watch you-tube on my school computer without it being blocked on the computer when it uses Lightspeed Systems Relay or
    7·1 answer
  • A Python programmer is writing a function definition. What syntax should be used?
    12·2 answers
  • I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending​
    11·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563
    5·1 answer
  • List four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish. Describe the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!