1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
15

What do you do when your computer shuts down

Computers and Technology
2 answers:
Ludmilka [50]3 years ago
4 0
A start it back up because it will turn on
GREYUIT [131]3 years ago
3 0
The answer is C the computer sure could be overheating better safe than sorry
You might be interested in
When you log into quickbooks online account whose books can you directly access and manage?
MArishka [77]

Answer: your books and the ones you are given access to.

Explanation: quickbooks goes from day to day bookkeeping to month and year end financial reports and tax filing. businesses use to manage daily sales and expenses and also keep track of daily transactions. They can involve or outsource bookkeepers or choose to run in-house operations. In doing this they would have access to all their books or decide to give virtual access to their outsourced bookkeeper/accountant. Quickbooks has multiple features concerning user access and privacy. A quick books user, in this case the business, can restrict access for each user it decides to add. The user can decide to give free access to all books or decide to restrict to a few files. Example, the business may add an accountant as one of its users and decide to restrict the accountant to its payroll files, depending on the agreement.

3 0
3 years ago
What framework uses CSS to access and manipulate HTML elements?
Jlenok [28]

Answer:

The correct answer is JQuery

Explanation:

JQuery uses CSS to access and manipulate HTML elements.

4 0
2 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" claims that the act of hacking is a deep-seated psychologic
lisov135 [29]

Answer:

Explanation:

Based on the information provided within the question it can be said that the text that supports this is that in the book it states that this disorder is due to an obvious "addiction" to the sheer thrill of hacking, born of having found ways around the supposed ingenuity of "invulnerable" cyber security defences.

5 0
3 years ago
Read 2 more answers
Engineers perform a(n) blank to compare the possible negative effects of making a decision involving technology with the possibl
Bumek [7]

Answer: Experiment.

Explanation:

4 0
3 years ago
Read 2 more answers
We begin with a computer implemented in single-cycle implementation. When the stages are split by functionality, the stages do n
vampirchik [111]

<u>Answer:</u>

a) First, we need to determine the pipeline stage amounting to the maximum time. In the given case, the maximum time required is 2ns for MEM. In addition, the pipeline register delay=0.1 ns.

Clock cycled time of the pipelined machine= max time+delay

=2ns+0.1 ns

=2.1 ns

b) For any processor, ideal CPI=1. However, since there is a stall after every four instructions, the effective CPI of the new machine is specified by:

1+(1 / 4)=1.25

c) The speedup of pipelined machine over the single-cycle machine=avg time per instruction of single cycle/avg time per instruction of pipelined.

Single cycle processor:

CPI=1

Clock period=7 ns

Pipelined processor:

Clock period=2.1 ns

CPI=1.25

Therefore, speedup==7^{*} 1 /\left(2.1^{*} 1.25\right)

=7/2.625

= 2.67

d) As the number of stages approach infinity, the speedup=k where k is the number of stages in the machine.

8 0
3 years ago
Other questions:
  • Please help.............​
    7·1 answer
  • Collins and quillian explained the results of priming experiments by introducing the concept of _____ into their network model.
    12·1 answer
  • What types of storage can be used to access your data on another computer?
    6·2 answers
  • Can someone please help me with this question??
    12·1 answer
  • Cell references in a formula are called _____.<br> a. assumptionsc. numbersb. valuesd. content
    11·1 answer
  • Where do players resurrect if they have been destroyed in a game?
    13·1 answer
  • BRAINLIEST plz help
    11·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Find the equation of a line which has 10 points the following two coordinates: (4, 0) and (3, 4)​
    13·1 answer
  • 25 points
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!