1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
4 years ago
6

When troubleshooting a computer hardware problem , which tool might help​

Computers and Technology
1 answer:
kirill115 [55]4 years ago
4 0

Answer:

Some softwares by microsoft or windows maybe :)

Explanation:

You might be interested in
Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restri
trapecia [35]

Answer:

B

Explanation:

Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restrictions? A. Adding a chart object B. Adding an Access object C. Adding a Word object D. Adding an Excel object microsoft word

Answer: B

6 0
3 years ago
Which of the following is the BEST example of the principle of least privilege? Correct Answer: Wanda has been given access to t
pishuonlain [190]

Answer: Wanda has been given access to the files that she needs for her job.

Explanation:

The principle of least privilege is when a user is only given the minimum level of permissions that he or she needs to perform a particular job function. This helps in reducing the risk of attackers having access to data.

The best example of the principle of least privilege is Wanda has been given access to the files that she needs for her job. Given access to all of the file servers or access to all of the files on one server is incorrect.

7 0
3 years ago
given:an int variable k,an int array currentMembers that has been declared and initialized,an int variable memberID that has bee
Oksi-84 [34.3K]

Answer:

// The code segment is written in C++ programming language

// The code segment goes as follows

for (k = 0; k < nMembers; k++)

{

//check if memberID can be found in currentMembers

if (currentMembers[k] == memberID){

// If yes,

// assigns true to isAMember

isAMember = true;

k = nMembers;

}

else{

isAMember = false;

// If no

// assigns false to isAMember

}

}

// End of segment:

The following assumption were made in the code segment above.

There exists

1. An already declared and initialised int array currentMembers.

2. An already initialised int variable memberID

Line 3 initiates a loop to scan through the array

Line 6 checks for the condition below

If current element of array equals memberID then

It assigns true to isAMember and nMembers to k

Else

It assigns false to isAMember

7 0
3 years ago
What is the minimum recommended point size for presentation text?<br> 12<br> 24<br> 36<br> 48
Darya [45]
The answer would be 24
6 0
3 years ago
What is the name of the time delay in a CPU caused by differences between the speed o CPU, the system bus, and memory circuits?
Digiron [165]

Answer:

Option b is the correct answer for the above question.

Explanation:

The wait state is a state in which any process is waiting in a queue for his option. It happens when the other process is going on. It is because the CPU has not the capability to solve the problem of more processor. The above question asked about the name of the delay which is caused by the CPU for any processor then the answer is wait state because when a process is ready for the process but it is waiting for his turn then the state of the process is known as a wait state. so the Option b is the correct because it states about the wait state which is the correct answer which is described above but the other is not because--

  • Option 'a' states about the wait cycle which is not the correct option.
  • Option c states about the dead cycle which is also not the correct answer.
  • Option d states about the memory write which is also not the correct answer.

4 0
3 years ago
Other questions:
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • To view the contents of a file that was compressed with the bzip2 utility, you must used the ____________________ command.
    9·1 answer
  • What would be the desired output of the home-security system
    8·1 answer
  • What is a special character when creating a password?
    8·2 answers
  • Can someone please help me
    15·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation
    9·2 answers
  • Type the correct answer in the box.
    15·1 answer
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
  • Wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!