1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
2 years ago
9

Why bootable installer preparation is important? explain

Computers and Technology
1 answer:
KIM [24]2 years ago
4 0

Answer:

because it helps power on the computer

Explanation:

You might be interested in
A computer has a pipeline with four stages. each stage takes the same time to do its work, namely, 1 nsec. how many instructions
prisoha [69]

In figuring, a pipeline, otherwise called an information pipeline, is a lot of information preparing components associated in arrangement

Further explanation:

In figuring, a pipeline, otherwise called an information pipeline, is a lot of information preparing components associated in arrangement, where the yield of one component is the contribution of the following one. The components of a pipeline are frequently executed in parallel or in time-cut style.

Instruction travelling:

999,999,997 guidelines for each second. The pipeline has 3 nsec of straightforward figurings, at that point finishes a guidance in each ensuing nsec.  

3nsec (for first guidance to go down the pipeline).10^9 ns every second. 10^9 – 3 = 999999997 directions.

Instruction per second:

MIPS - Million guidelines for each second  

Million guidelines for each second (MIPS) is a more established, outdated proportion of a PC's speed and power, MIPS measures generally the quantity of machine directions that a PC can execute in one second.

Per second:

Million directions for each second (MIPS) is a more established, old proportion of a PC's speed and power, MIPS measures generally the quantity of machine guidelines that a PC can execute in one second. Be that as it may, various directions require pretty much time than others, and there is no standard strategy for estimating MIPS. Moreover, MIPS alludes just to the CPU speed, while genuine applications are commonly constrained by different elements, for example, I/O speed

Answer Details:

Subject: Computer and technology

Level: College.

Key Words:

Further explanation:

Per second:

Instruction per second:

Instruction travelling:

For further Evaluation:

brainly.com/question/6362387

brainly.com/question/12938965

6 0
3 years ago
Read 2 more answers
What are 6 external parts or perpherals of a computer system and identify output from input devices.
n200080 [17]
40. External Peripherals of a Computer systems are the following: -> Keyboard – this is an input device -> Mouse – This is an input device also -> Printer – this is an output device -> Flashdrive – This is a storage device -> Monitor – this is an output device -> external hard drive – this is a storage device Output device are those devices that communicate the results of the data processing to the user Input device are those device that communicate the results of the data processing to the computer system Storage device are those device that stores data.
4 0
3 years ago
Explain what will happen if we continue to use fossil fuels at the rate we are now and what impacts it will have on the planet.
Westkost [7]

Answer:

At the point when non-renewable energy sources are singed, they discharge carbon dioxide and other ozone depleting substances, which thusly trap heat in our air, making them the essential supporters of an Earth-wide temperature boost and environmental change. At the point when we consume oil, coal, and gas, we don't simply meet our vitality needs—we drive the current an unnatural weather change emergency also. Non-renewable energy sources produce huge amounts of carbon dioxide when consumed. Carbon discharges trap heat in the air and lead to environmental change.

7 0
3 years ago
Design a do-while loop that asks the user
sattari [20]
String answer = new String( "" );
do
{
    System.out.println( "Question? " );
}
while( answer.length > 0 )
5 0
3 years ago
A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
pychu [463]

Answer:

symmetric encryption

Explanation:

Asymmetric encryption uses 2 keys.

6 0
2 years ago
Other questions:
  • Samantha plans an investigation in which she will study a population of animals. Which of these answers best describes the focus
    8·1 answer
  • What is the part of the browser window that displays the content of the web page such as pictures and text called?
    10·1 answer
  • Which of the following can you use to attach external hardware devices to a computer?
    11·2 answers
  • How many mustangs are built every day
    13·2 answers
  • Instructions:Select the correct answer from each drop-down menu.
    14·1 answer
  • What does it mean if my ninja blender power light is blinking?
    13·2 answers
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • Which company was the first to develop personal computers?
    6·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • What is the output of the following code snippet if the variable named cost contains 100? if cost < 70 or cost > 150 : dis
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!