1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
14

Reggie receives a phone call from a computer user at his company who says that his computer would not turn on this morning. Afte

r asking questions, Reggie realizes that the computer seems to turn on because the user can hear fans spinning and the indicator light comes on and flashes during the boot. The Num Lock key is on, but there is no video on the monitor. Reggie also learns that the computer has a new video card. The night before the computer was working fine, according to the user. Reggie tests the video cord and the monitor. When Reggie reattaches the video cable to the video card port, the computer appears to be working. What might be the problem?
Computers and Technology
1 answer:
Virty [35]3 years ago
8 0

Answer:

The Integrated video may not be working properly well or functioning well.

Explanation:

Solution:

In this case, it is known that the computer was working fine a night before the problem.

If the video cable is connected to a wrong video port, then the computer was unable to work previous night.the integrated video cord has not seated because most times it occurs, due to the heat sink in the card. after restoring the video cable to the video card port, it works.

If the video was disabled in  BIOS/UEFI, it does not show video, even after restoring the cable.

You might be interested in
In unreal engines which class should be used to define the rules of the game
mel-nik [20]

Answer: The number of players and spectators present, as well as the maximum number of players and spectators allowed.

Explanation: players

8 0
3 years ago
A(n) ____ is a computer that requests and uses network resources from a(n) ____.
Crazy boy [7]

A(n) client exists a computer that requests and utilizes network resources from a(n) server.

<h3>What is a computer network?</h3>
  • A computer network is a collection of computers that share resources that are available on or provided by network nodes.
  • The computers communicate with one another via digital links using standard communication protocols.
  • These links are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a variety of network topologies.
  • Nodes in a computer network can be personal computers, servers, networking equipment, or other specialized or general-purpose hosts.
  • They can be identified by network addresses and have hostnames.
  • Local-area networks (LANs) and wide-area networks (WANs) are the two basic network types.
  • A(n) client exists a computer that requests and utilizes network resources from a(n) server.

To learn more about computer network, refer to:

brainly.com/question/8118353

#SPJ4

6 0
1 year ago
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud
fgiga [73]

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

8 0
3 years ago
Label the strength of a beer based on its ABV. For each beer display the beer's name, ABV, and a textual label describing the st
belka [17]

Answer:

By presuming the question expect us to write a program to address the problem and the solution code written in Python is as follow:

  1. beer_name = input("Enter beer name: ")
  2. abv = int(input("Enter ABV value: "))
  3. if(abv > 10):
  4.    label = "Very High"
  5. elif(abv >=6):
  6.    label = "High"
  7. elif(abv >=3):
  8.    label = "Average"
  9. else:
  10.    label = "Low"
  11. print("Beer Name: " + beer_name)
  12. print("ABV value: " + str(abv))
  13. print(label)

Explanation:

Firstly, we can use input function to prompt user to input beer name and ABV value (Line 1 - 2).

Next, create if else if statements to check abv fallen into which range of value and then set a label accordingly (Line 4 -11). For example if abv is 4, the label will be set to "Average".

At last, print the information of beer that includes beer name, abv value and label (Line 13 - 15).

5 0
3 years ago
Can I major in gaming like not game design but like gaming where I can earn money
lozanna [386]

Answer:

yes some companies offer jobs in testing games for them to help find glitches and such before they go onto the market

7 0
3 years ago
Read 2 more answers
Other questions:
  • 1.What is Intellectual Property
    9·1 answer
  • Briefly explain what is net neutrality and why is it important today
    15·1 answer
  • In DTP, a good rule of thumb is to use as many special effects as you need to make your documents look interesting.
    5·1 answer
  • Use the distributive property to expand the following expression. (9m - 6)7
    13·2 answers
  • All tif files start at offset 0 with what 6 hexadecimal characters?​
    11·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • Write a program in python to make the figure:-
    12·1 answer
  • College entrance requirements are the expectations for admission.
    12·1 answer
  • A search expression entered in one search engine will yield the same results when entered in a different search engine.
    15·1 answer
  • Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an acti
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!