1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
10

What is the first thing you should do when troubleshooting a computer problem?

Computers and Technology
2 answers:
hichkok12 [17]3 years ago
6 0

Answer:

A. Identify and locate the problem.

Explanation:

A problem-solving process can be defined as the systematic approach to used to identify and determine the solution to a particular problem.

The first thing you should do when troubleshooting a computer problem is to identify and locate the problem.

Basically, when an administrator or network engineer is trying to proffer a solution to a computer or network-related problem, it is very important and essential for he or she to first identify what the problem is. This is necessary because it will help to ensure that his or her energy is channeled in the right direction.

Hence, once the problem is identified, then a theory of probable cause can be established.

Xelga [282]3 years ago
3 0

Answer:

A

Explanation:

You might be interested in
Which of the following is a term used for the permanent record of activities performed on the Internet?
Rasek [7]

Answer:   Your history and you can check everything using a MAC or IP password

6 0
3 years ago
i was playing a mobile game and I was a guild leader in there. one of the members were very disrespectful and they just left bec
Sonbull [250]

Answer:

which mobile game? Whatever the worst thing you can do is. If its slurs and harassment or bullying report them

Explanation:

3 0
2 years ago
Read 2 more answers
Which of the following ensures that dropped packets are resent?
Agata [3.3K]

Answer:

TCP

Explanation:

Transmission control protocol ensures packets loss and performs retransmission

TCP works with Internet Protocol (IP)

TCP/IP defines how computers send data packets to each other.

TCP allows transmission of information in both the direction.

Bit rate :defines the rate at which bits are transferred from one place to another

7 0
3 years ago
If you type =5*3 into a cell, what do you expect the answer will be?
Ilya [14]

Answer:

I think 15

what do you mean by cell

Explanation:

3 0
3 years ago
Read 2 more answers
Ruth designs games for mobile operating systems such as iOS and Windows. The demand for games on mobile devices is high. Ruth’s
VMariaS [17]

Answer:

Viper Slash can be classified as a Question mark product

Explanation:

BCG matrix is a method developed by the Boston Consulting Group to analyze the strategic position and potential of businesses or products.

Business portfolios are evaluated using

  1. Relative market share
  2. Market growth rate

The result of the analysis is divided into four quadrants

  1. Dogs
  2. Cash cows
  3. stars and
  4. question marks

  1. Dogs: This comprises of business portfolios that operate in a slow-growing market. Investing in businesses in this quadrant is not advised due to their poor cash returns.
  2. Cash cows: These include business portfolios that provide high cash returns and should be milked.
  3. Stars: These are business portfolios that are operating in a fast-growing market and possess very high prospects of becoming cash cows.
  4. Question marks: are business portfolios that are underdogs in fast growing markets, they consume much cash but still, incurred losses. They don't gain many market shares despite high investments and have great tendencies to become dogs.

Ruth's Viper Slash falls into the Question marks category as the games section is a fast-growing market and struggle to gain market shares.

6 0
3 years ago
Other questions:
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • ________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
    12·1 answer
  • you just bought a new hard drive for your computer you plan to use this as a second hard drive to store all your you made files
    6·1 answer
  • Suppose we perform a sequence of n operations on a data structure such that if some condition C(k) holds then the kth operation
    7·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • What is the purpose of a career portfolio?
    6·1 answer
  • Which of the following defines a computer program?
    14·1 answer
  • Which of the following is a property of TCP?
    8·1 answer
  • Describe the main roles of the communication layer, the network-wide state-management layer, and the network-control application
    15·1 answer
  • What is a field on a table
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!