1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
2 years ago
15

What are the process of boots up a computer?​

Computers and Technology
2 answers:
Anettt [7]2 years ago
8 0

Answer:

» Switch on the power from the power source.

» The power supply sends electric signals to the motherboard.

» The BIOS performs the POST ( Power On Self Test)

» The CMOS chip loads configurations in the RAM

» The kernel of the operating system loads files in the hard disk.

» The operating system loads the welcome screen, where the computer varifies the user to see if he or she is a legitimate user through a password.

» Load the desktop.

BigorU [14]2 years ago
4 0

Answer:

The process of boot-up a computer are: Power On, POST, Load BIOS, Operating system load, and transfer of control to the OS.

You might be interested in
. SQL is a(n) _____ language.
Blababa [14]

Answer: Fourth- generation language

Explanation:Structured Query Language (SQL) is the language that is in the form of database structure which helps in the manipulation of the data and management as well.

SQL is considered as the fourth generation language because it is used for the accessing of the data from the database.It is also known for the advancement in the third generation language and thus also improving the language interface with users.

7 0
3 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
3 years ago
How do u set up a Wi-Fi network on Android ​
AlladinOne [14]

Answer:

These are some way I know

5 0
3 years ago
In Tynker it is not possible to create a/an______.
alina1380 [7]

Answer:

IDE

Explanation:

8 0
3 years ago
SSDS are ______ than magnetic hard disks
Deffense [45]
The answer is 1 faster
6 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • How many points are in an inch? <br> A 24<br> B 50<br> C 72<br> D 100
    5·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • Which of the following is something you need to keep an eye out for
    7·2 answers
  • Which of the following is best known as a business network LinkedIn, Facebook, Twitter or Word Press?
    15·1 answer
  • ________ of Willa Catha present an unadorned picture oflife on the prairies of the Midwestern United States during the19th centu
    8·1 answer
  • Preliminaries
    13·1 answer
  • In Python which is the correct method to load a module math?
    10·1 answer
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
  • Write a while loop that continues to increment uservalue by 5 as long as uservalue is less than 0.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!