1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
2 years ago
5

How to shutdown a computer by step by step​

Computers and Technology
2 answers:
Reptile [31]2 years ago
7 0

<u><em> </em></u>Answer:

1) Press Ctrl + Alt + Del

2) Click the power button in the bottom-right corner of the screen.

3) From the desktop, press Alt + F4 to get the Shut Down Windows screen.

and that's how to shut down your computer

<u><em></em></u>

<u><em>Please mark as brainliest if answer is right</em></u>

Have a great day, be safe and healthy  

Thank u  

XD  

Serhud [2]2 years ago
7 0

Answer:

click on start button

click on shut down button

wait for screen to turn blank

switch off monitor

switch off the electricity

You might be interested in
Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and lapto
k0ka [10]

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

  • Digital signature
  • Heuristic detection
  • Behavior detection
  • Sandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

7 0
3 years ago
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
Vlad [161]

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

3 0
2 years ago
Does anybody know a better app I can use instead of Brainly
melomori [17]

Answer:

Education subreddits on reddit

Explanation:

6 0
3 years ago
Read 2 more answers
You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
dusya [7]

Answer:

A, B

Explanation:

A. selects accountholder's ids and check them with those who don't have cities in BranchMaster table.

B. We can use both <em>NOT IN</em><em> </em> as well as <> operator for comparison so it selects accountholder's ids which are not in all of those account holders who have cities in BranchMaster.

5 0
3 years ago
How many bits are necessary for a binary representation (unsigned) of
Musya8 [376]
A. 5
b. as an unsigned int: 9. Normally a year is 365.25 days which would require 32-bits for an IEEE float.
c. 25
3 0
3 years ago
Other questions:
  • Given the integer variables x and y, write a fragment of code that assigns the larger of x and y to another integer variable max
    5·1 answer
  • A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.
    13·1 answer
  • How do i unblock website on my school computer
    7·2 answers
  • Write a method body for the static method isDivisibleBy5 shown below. The only NaturalNumber methods you are allowed to use are
    12·1 answer
  • ​Lara is the chief editor of "Laughter and Life," an online magazine. Lara has assigned Jenny the task of redesigning the magazi
    5·1 answer
  • Date Time Manipulation Exploration If you start from Jan 1st, 1757, and repeatedly add 8 days, until you hit 1800, how many time
    14·1 answer
  • CreatePolicies<br> I need help with this in java.
    8·1 answer
  • In HTML, an opening tag and its closing tag must appear on the same line. True Or False​
    12·1 answer
  • Another name of computer program is
    6·1 answer
  • Which of the following are responsibilities of information security management? Defining the protection required for systems and
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!