1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
10

Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha

ndy man, restart, shut down, call, and thank you.
Computers and Technology
2 answers:
statuscvo [17]3 years ago
4 0

Answer:

You could call a handy man to take a look at your computer if you are having drastic issues. You could also restart or shut down you computer a few times because it might need a massive update. You might need to call the company  you bought your computer from and ask about what to do when that problem is happening. Thank you for reading my answer!

Explanation:

I think these answers make since.

vovikov84 [41]3 years ago
3 0

Answer:

You should restart your computer

You might be interested in
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
3 years ago
____ will find all records where there is any entry in the field, even if the entry is 0.
Reil [10]
Answer : IS NOT NULL
4 0
3 years ago
"what type of database allows new tables to be created out of information that is requested in a search of the database
Talja [164]
If you don't put propper measures into place while creating this database your site will vulnrable to SQL Injections. In this age most sites aren't because people have learned from past mistakes. My advice do some pentesting when you finish the site and if is vulnrable to SQL Injections quit web devlopment!
3 0
3 years ago
Read 2 more answers
Which feature of a word processing program enables you to represent an text information in the form of a diagram?
Alona [7]
Find-and-replace feature
6 0
3 years ago
Read 2 more answers
In class Assignment Setup of Production FacilityJobs Description Duration/ Weeks Predecessors1 Design production tooling 4 - 2 P
Zolol [24]

Answer:

See explaination

Explanation:

Critical path method (CPM) is a step-by-step process by which critical and non-critical tasks are defined so that time-frame problems and process bottlenecks are prevented.

please see attachment for the step by step solution of the given problem.

3 0
3 years ago
Other questions:
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • FIND THE 6 ERRORS IN THIS RESUME 30 POINTS!!!!
    12·1 answer
  • This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
    7·1 answer
  • economists measure the personal satisfaction someone gets from consuming goods and services with the concept of.....?
    6·1 answer
  • Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
    10·1 answer
  • Why computer literacy is vital to access in business work
    7·1 answer
  • What caused accident? into passive voice​
    13·1 answer
  • What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centi
    12·1 answer
  • What would a bar graph best be used for? State why and give 2-3 examples of things you could demonstrate with a bar graph
    5·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!