1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
15

Diagnosing is solving the problem, and troubleshooting is figuring out what the problem is.

Computers and Technology
2 answers:
LekaFEV [45]3 years ago
8 0
False I love you you're the best
nasty-shy [4]3 years ago
6 0
Diagnosing is figuring out the problem and what caused it whereas troubleshooting is trying different solutions and checking if they work for a problem
You might be interested in
How do you open Microsoft Excel 2013 with Windows 8?
adell [148]
Go to the apps page. When you get there find the search bar, and once you find the search bar, click in it and type in Microsoft Excel 2013. The application will come, click on it and it will open. *Note:- This is only if you have already downloaded it on your computer/laptop, or if it came with your laptop/computer.*

Hope I helped ya!! xD
8 0
3 years ago
If the fluid level in a battery is below the separators<br> should be added but never add
geniusboy [140]
Never add tap water to your battery. ... Battery electrolyte levels should be just below the bottom of the vent well, about ½ - ¾ inch above the tops of the separators. Never let the electrolyte level to drop below the top of the plates.
7 0
3 years ago
-Define three types of user mode to kernel mode transfers?
Ivahew [28]

Answer:

 The three types of user mode to the kernel mode transferred occurred due to the:

  • It is mainly occurred due to the interrupt when, it send to the central processing unit (CPU).
  • It also occurs due to the hardware exception and when the memory is access illegally as it is divided by the zero.
  • It is mainly implemented or executed by the trap instruction as the system are basically executed by the program.
7 0
3 years ago
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget th
never [62]

Answer: key escrow

Explanation:

Using key escrow we are able to recover data if passphrase is forgotten. this technique uses a bypass link to get all the keys to the system only if it is an authorized entry.

7 0
3 years ago
If you see these REPORT.
Alenkinab [10]

Answer:

ok will do

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • 6. A distribution consists of three components with frequencies 200, 250 and 300 having means
    14·1 answer
  • To save and store data separate from a computer, it helps to have an
    15·2 answers
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all
    15·1 answer
  • g Which of the following factors primarily determines how the Internet is used in different countries? A. local attitude to info
    6·1 answer
  • What is phishing?
    14·1 answer
  • An IP address specifically belongs to:
    10·1 answer
  • When you start a new, blank document, you usually end up changing the font to arial 11. 5 point. How can you make these settings
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!