1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
12

Read the scenario and answer the question. Audrey had problems with her computer software recently. One of her programs shut dow

n unexpectedly, but not because of a virus. Unable to troubleshoot the problem herself, Audrey called a computer technician, who gave her a checklist of things to look for and fix. Her software began to work again, but not for long. The following week, Audrey had the same problem with her software. What is the first step Audrey should take? Refer to the troubleshooting checklist. Scan the computer for viruses. Remove all unwanted files from the computer. Pay to have a technician repair the computer.
Computers and Technology
2 answers:
valkas [14]3 years ago
7 0

Answer:

the answer is a

Explanation:

i got it right

Sophie [7]3 years ago
6 0

Answer:

Refer to the troubleshooting checklist.

Explanation:

I got it right in edge:)

You might be interested in
Which of the following is a professional organization in the field of IT? Society for the Prevention of Cruelty to Animals (SPCA
Lelu [443]
(IEEE) Is the obvious answer ; no harshness meant in any way
7 0
3 years ago
Read 2 more answers
What is digital revolution?
oksano4ka [1.4K]
The Digital Revolution refers to the advancement of technology from analog electronic and mechanical devices to the digital technology available today. The era started to during the 1980s and is ongoing. ... The Digital Revolution is sometimes also called the Third Industrial Revolution.
5 0
3 years ago
Can someone answer these 2 please
Leto [7]

Answer:

c for the first one and d for the secound one

Explanation:

5 0
2 years ago
What term is used for a seemingly harmless program that has malicious code hidden inside?
Delicious77 [7]
That is none other than a "Trojan Horse"
8 0
3 years ago
Combination of two or more networks
bezimeni [28]
The combination of two or more networks is internet work!!
Hope this helps
4 0
3 years ago
Other questions:
  • The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe p
    12·1 answer
  • Which of the following is a key component to your individual internet safety? government regulations
    13·1 answer
  • Which is a safe Internet behavior?
    5·1 answer
  • A series circuit and identify how voltage is split up by each load in the circuit?
    11·1 answer
  • The prediction that the number of transistors on a chip would double about every two years is known as ________. Metcalfe's law
    6·1 answer
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • What port number is the well-known port used by web servers to distribute web pages to web browsers?question 3 options:?
    6·1 answer
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • Area Triangolo Rettangolo in c++
    6·1 answer
  • The residual volume can be measured directly with: Select an answer and submit. For keyboard navigation, use the up/down arrow k
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!