Answer: • Ensure that the video card is compatible with the expansion slot
• Install video drivers from CD and then install updated drivers from the internet
• Configure the PC to use the integrated graphics if available and needed
Explanation
Your question isn't complete as you didn't put the options but I got the options online and the correct answers have been provided.
The installation and configuration for the high-end video card suitable for gaming will include:
• Ensure that the video card is compatible with the expansion slot
• Install video drivers from CD and then install updated drivers from the internet
• Configure the PC to use the integrated graphics if available and needed
Answer:
BMP
Explanation:
They are high resolution and are suitable for billboards.
Changing the configuration of a database falls under which category of databaseâ administration?
d. operation
Answer:
Yes. Pseudocode is an improvement over the IPO chart because it lays out the sequence of steps for a particular program
Explanation:
The input–process–output (IPO) chart is a widely used approach in systems analysis and software engineering for describing the structure of an information processing program or other process. The chart has three components (Input, Process and Output), and you write the description of each component in plain English, not code or mathematical formulas.
Pseudocode is a procedure for solving a problem in terms of the actions to be executed and the order in which those actions are to be executed.
Pseudocode is an improvement over the IPO chart because it shows the step by step sequence to be followed by a particular program unlike the IPO chart which just break the program into Input, Process and Output.
Answer:
A dictonary attack.
Explanation:
Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.