1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
4 years ago
10

A(n) ________ software installation copies all the most commonly used files to your computer's hard drive.

Computers and Technology
1 answer:
irinina [24]4 years ago
8 0

Answer:

Full

Explanation:

According to my research on IT tasks, I can say that based on the information provided within the question this type of software installation is called a Full Software Installation. This type of installation is usually done when installing a brand new operating system, which you then need to install all the necessary software that is commonly needed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
antoniya [11.8K]
Answer:

Jason = <span>20yrs.old</span>

Mandy = <span>15yrs.old</span>

Explanation:

Let

J = Jason's age

M = Mandy's age

<span>J+M=35</span> ..... eq. 1

<span>J−10=2<span>(M−10)</span></span> ..... eq. 2

From eq. 1

<span>J=35−M</span>

Substitute this in eq. 2.

<span><span>(35−M)</span>−10=2<span>(M−10)</span></span>

<span>35−10−M=2M−20</span>

<span>35−10+20=2M+M</span>

<span>45=3M</span>

<span><span>453</span>=<span><span>3M</span>3</span></span>

<span>15=M</span>

<span>J=35−M</span>

<span>J=35−15</span>

<span>J=<span>20</span></span>

5 0
3 years ago
Which new jobs will be in demand in the next 20 years
s2008m [1.1K]
The answer is Data Jobs, Data Analysis, Solution Architecture, Software Engineering and Product Managers, there is many more but there's just a few. Hope I helped! :)
3 0
3 years ago
business ethics chapter 7 jordan, a software engineer, is responsible for maintaining the private piece of his company's interne
Sonbull [250]

Answer:

Extranet

Explanation:

An extranet is a private network which uses Internet technology to privately share part of a company's information with clients. An extranet allows access to partners, customers, vendors and suppliers or an authorized clients by using the internet for private collaboration and information sharing among the team members, as well as the company's clients.

Therefore Jordan, a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password is called ENTRANET private network.

8 0
3 years ago
Computers were originally invented to
Afina-wow [57]

Answer:

B

Explanation:

It's B because why would it me made to play video games

5 0
3 years ago
Read 2 more answers
You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network consists of servers, routers,
AleksandrR [38]

Answer:

Ensuring that Internet Service Providers (ISPs) work with IPv6 .

Explanation:

An Internet Service Provider (ISP), it is the company that supply to other companies or an individuals for accessing the Internet and some other services such as virtual hosting and Web site building. ISP has the telecommunication line and an equipment to access the required point of area for the Internet.

4 0
3 years ago
Other questions:
  • The Start menu on Windows computers changes based on actions performed by their users. True False
    15·2 answers
  • The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
    7·1 answer
  • What is the purpose of the domain name? The domain name is an example of a service provider. The domain name .gov.nz is an examp
    15·2 answers
  • ______ norms are usually unstated rules that regulate members' interaction.
    12·1 answer
  • When Google created its China-based search engine www..cn, they did not foresee eventually abandoning it because of censorship i
    12·1 answer
  • Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not makin
    13·1 answer
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • What are like arms surrounding all the other code blocks?
    11·2 answers
  • An example of documentary evidence that might be presented at trial for a cyber crime is:
    9·1 answer
  • Based on Microsoft's Component Object Model (COM), _____ is database middleware that adds object-oriented functionality for acce
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!