1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
9

Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What

should Sherri consider prior to taking the laptop apart
Computers and Technology
1 answer:
AVprozaik [17]3 years ago
8 0

Complete Question:

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)

Group of answer choices.

a. Try an external device before replacing the motherboard.

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Answer:

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Explanation:

In this scenario, Sherri is considering replacing a processor on her laptop because the laptop is running slower than she would like.

Hence, Sherri should consider the following informations prior to taking the laptop apart;

I. Make sure you have the correct processor for the motherboard. She can get the specifications of the motherboard and processor on the manufacturer's website.

II. Verify that the laptop is not under warranty because if it still under warranty, taking the laptop apart would void the warranty granted by the original manufacturer.

III. Determine whether a teardown procedure is available. She should ensure there is a guide available for dismantling and re-coupling of the laptop.

You might be interested in
I have an airsoft pistol and I needed to take it apart to repair it and I lost some screws that were tiny and I dont know what t
Illusion [34]
I'm not 100% sure but Allen bolts also known as smaller p1 drivers are found in almost every air soft gun, that may have been what you lost.
5 0
3 years ago
Write a 2 paragraph on an African American who has become successful in IT. Need help asap can’t think of anything
Katen [24]

Answer:

wait you need 2 paragraphs on an african american that became sucessful in what? please clear this up so that i can help you

Explanation:

5 0
3 years ago
A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right. For example, we can shift the
Genrish500 [490]

Answer:

Aee explaination

Explanation:

#Implementation of shiftLeft method

#which shifts the bits in its input one

#place to tge left

def shiftLeft(bitstring):

bitstring = bitstring[1:]+bitstring[0]

#return as bit string format

return bitstring

#Get the input from user

bits = input("Enter a string of bits: ")

#call the shiftLeft method which returns the value

# that is stored in leftShift

leftShift = shiftLeft(bits)

#Display the output

print()

print(leftShift)

print()

8 0
4 years ago
A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
dimaraw [331]
I believe the answer is a digital certificate
7 0
3 years ago
Read 2 more answers
A hacker scanning a web server is likely to be identified by the target's web a. Because of the FBI's Carnivore scanning program
eduard

Answer:

C

Through the target's web server's log.

Explanation:

A web server is a server software or a hardware that is fully dedicated to the running of that software. It satisfies a user's request on the www that is the World Wide Web. A web server can, contain just one or more websites.

It processes incoming network requests over HTTP and several other related protocols.

It also stores the webpages the user have visited in the past. Tracking the target's web server to know what enter or left can expose the hacker that is scanning a user's web server.

5 0
3 years ago
Other questions:
  • In what ways us cyberspace is real? list at least 3 examples to support your response .
    9·1 answer
  • How can you tell if a website is secure
    13·1 answer
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • When you want to avoid sending email that a recipient may feel their privacy has been invaded, how would you fill in the (To) bo
    13·1 answer
  • Which of the following is not a method of data management?
    15·1 answer
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • Which term collectively describes hard disks, CDs, and flash drives?
    11·2 answers
  • Multiple Choice
    9·1 answer
  • Why is information broken down into packets
    15·1 answer
  • Why bootable installer preparation is important? explain
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!