1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
4 years ago
5

If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on

the drive, what must you have?
Computers and Technology
1 answer:
Llana [10]4 years ago
5 0
You must have an administrator password before you can access the drive <span />
You might be interested in
Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output i
trapecia [35]

Answer:

num1=2

num2=3

num3=5

num1= int(num1)

num2= int(num2)

num3= int(num3)

pro = num1*num2*num3

print(pro)

Explanation:

This is very close to a correct answer in easy code and easy to read, I was not able to put the answer in without the proper indentation alignment the way I would present this. So please adjust to your requirements for the indentation.

3 0
2 years ago
Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
ale4655 [162]

Answer:

  b)  A separate part of the program that performs a specific task.

Explanation:

A subroutine is a portion of the program that can be invoked to perform a specific task. Typically, it performs that task and returns execution control to the point immediately following its invocation. It may or may not maintain "history" or "state", and it may or may not throw exceptions.

A well-behaved subroutine will only operate on data passed to it, will not maintain any internal history or state, and will have only one exit.

8 0
3 years ago
What statement best describes operating systems?
GenaCL600 [577]

Answer:

An operating system, or "OS," is software that communicates with the hardware and allows other programs to run

3 0
3 years ago
Hola, disculpa me podrías ayudar enviándome una captura dándole like a este video? Por favor, es un proyecto escolar en el que e
PtichkaEL [24]

Answer:

Una captura de pantalla es una instantánea de la pantalla de un dispositivo informático, como un teléfono o una computadora. Mantenga presionado el botón de encendido y el botón de columna hacia abajo para tomar una captura de pantalla en teléfonos inteligentes.

Explanation:

Una captura de pantalla de la pantalla de un dispositivo de computadora es como tomar la foto de una pantalla. Para los teléfonos inteligentes, presionar la columna hacia abajo y el botón de encendido tomaría la instantánea del teléfono.

Para darle Me gusta a un video en una plataforma de redes sociales, simplemente haga clic en el ícono de pulgar hacia arriba.

6 0
3 years ago
What is the term for a problem in your code
Anna71 [15]

Answer:

bug

Explanation:

Bug

a problem in your code

7 0
3 years ago
Read 2 more answers
Other questions:
  • Your crt monitor flickers. what should you do
    6·1 answer
  • Which phrase describes this image most precisely?
    10·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
    5·1 answer
  • As the project manager for a software development project, you are helping to develop the project schedule. You decide that writ
    13·1 answer
  • During the conflict resolution process, which of the followings statements would be appropriate when defining the problem?
    11·2 answers
  • What do GUI use except​
    10·1 answer
  • Pls answer dis question when i'm not connected and i open bluestacks 5 it will be working but if i am connected it wil not work
    14·1 answer
  • Select the correct answer.
    14·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!