1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
7

Ria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the

new partition information must be manually reloaded. Which of the following should she do next? (Choose two. Either answer is
Computers and Technology
1 answer:
pickupchik [31]3 years ago
8 0

Answer:

a and d

Explanation:

A. Run the parted command

D. Reboot the system

These two actions will make it easier to manually reload the fdisk

You might be interested in
What is astronaut favourite key on keyboard? ​
Dennis_Churaev [7]

Answer:

The space bar is an astronauts favorite key

5 0
2 years ago
Read 2 more answers
Assume that the classes listed in the Java Quick Reference have been imported where appropriate. Unless otherwise noted in the q
mash [69]

Answer:

See explaination

Explanation:

import java.util.*;

class UserName{

ArrayList<String> possibleNames;

UserName(String firstName, String lastName){

if(this.isValidName(firstName) && this.isValidName(lastName)){

possibleNames = new ArrayList<String>();

for(int i=1;i<firstName.length()+1;i++){

possibleNames.add(lastName+firstName.substring(0,i));

}

}else{

System.out.println("firstName and lastName must contain letters only.");

}

}

public boolean isUsed(String name, String[] arr){

for(int i=0;i<arr.length;i++){

if(name.equals(arr[i]))

return true;

}

return false;

}

public void setAvailableUserNames(String[] usedNames){

String[] names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

for(int i=0;i<usedNames.length;i++){

if(isUsed(usedNames[i],names)){

int index = this.possibleNames.indexOf(usedNames[i]);

this.possibleNames.remove(index);

names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

}

}

}

public boolean isValidName(String str){

if(str.length()==0) return false;

for(int i=0;i<str.length();i++){

if(str.charAt(i)<'a'||str.charAt(i)>'z' && (str.charAt(i)<'A' || str.charAt(i)>'Z'))

return false;

}

return true;

}

public static void main(String[] args) {

UserName person1 = new UserName("john","smith");

System.out.println(person1.possibleNames);

String[] used = {"harta","hartm","harty"};

UserName person2 = new UserName("mary","hart");

System.out.println("possibleNames before removing: "+person2.possibleNames);

person2.setAvailableUserNames(used);

System.out.println("possibleNames after removing: "+person2.possibleNames);

}

}

4 0
3 years ago
What should you install in a server room that will save space by allowing you to control multiple servers with a single mouse, k
Nata [24]

Answer:

a KVM switch

Explanation:

KVM switch is devise used for handling or connecting different server at any time by using single mouse, monitor and keyboard. it is like an interface used to connect different server at any given time.

different type of KVM switch are

1) USB based KVm

2) Emulated USB type KVM

3) DDM USB type KVM

4) semi -DDM KVM

7 0
3 years ago
Algonac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their re
Masteriza [31]

Answer:

ADD ME ON TIK TOK @ madison.beautiful.dancer

Explanation:

3 0
3 years ago
ENG103 DISCUSSION BOARD 6
amm1812
The proper citation for your course of study -computer related- is APA (American Psychological Association)  format. This citation format allows us to state the publication date, title , and authors in an organized and short fashion. All scholarly reports that are technology or psychology based, should be cited in APA format. 

<span>I know this because it is the format I use for all of my college courses which are all Computer/Technology related. </span>
3 0
3 years ago
Other questions:
  • Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
    5·2 answers
  • If you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information. Pleas
    7·2 answers
  • You are attempting to gather information about a client's network, and are surveying a company site. Access is gained via secure
    8·1 answer
  • Describe the role of the microprocessor in an automatic washing<br> machine (IGCSE)
    10·1 answer
  • James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the d
    12·1 answer
  • Explain the impacts of computer in education
    6·2 answers
  • Is this App for real?​
    5·1 answer
  • What type of malicious software tries to gather information about you without your consent?
    7·1 answer
  • The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
    8·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!