1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
11

Choices.

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
7 0

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

You might be interested in
Using a USB flash drive, you intend to install Windows 10 on several computers. To save time, you would like to automate the
artcher [175]

Answer:

Create an answer file named config.xml. Place the file on a USB flash drive and run setup.exe.

Create an answer file named automated.exe. Place the file on a USB flash drive and run

4 0
3 years ago
Each device attached to your computer comes with a special program called a(n ________ that enables the device and operating sys
Serhud [2]
Driver- comes with a driver installed.
7 0
4 years ago
Anyone help me with number 41.
Katarina [22]
It is te = t I yhink
8 0
3 years ago
What are the two major types of sas steps?
QveST [7]

The two major SAS steps are data and proc.

SAS programming structure is based on two essential steps, Data and Proc.

1. The DATA step:

This involves collecting and uploading the essential data to the program memory. It is used to update, modify and edit the data in case of any errors once it has been added to a dataset. New datasets can be created from existing ones by updating, editing, and/or merging them. at the end of this step, SAS data sets are created.

2. The PROC step:

This step processes and analyses the data collected into datasets in the previous step. it is used to perform specific functions on the data. at the end of the proc step, a result or report is produced.

In a SAS code, each line of code should begin either with a DATA or PROC step.

<u>While the other options are incorrect because: </u>

<u />

  • Analysis: analysis is done in the PROC step.
  • Content: Data or content is collected in the DATA step.
  • Stat: a stat function acquires the status information regarding a specific file. Functions are performed on the datasets in the PROC step.
  • Run: This command is used to execute a code.
  • Import: Datasets are created by importing data from other datasets and outside.
  • Print: the report produced at the end of the PROC step can be printed as a hard copy.

You can learn more about SAS at

brainly.com/question/13615203

#SPJ4

8 0
2 years ago
Write a function call using the ebay_fee() function to determine the fee for a selling price of 15.23, storing the result in a v
Sholpan [36]

Answer:

my_fee = ebay_fee(15.23)

Explanation:

Functions are sections of a program that provide a particular outlined procedure, we call a function by writing its name followed by a pair of parenthesis, the function may be designed in a way that it accepts arguments while been called, Like the case of the ebay_fee(15.23). the number within the pair of parenthesis id the argument, and it is the data that the functions will process and return a value afterwards.

7 0
4 years ago
Other questions:
  • Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
    8·1 answer
  • Your supervisor has asked you to set up a RAID hard drive array in a tower system, which has a motherboard that uses the B360 ch
    10·1 answer
  • You want to make it possible for your smartphone to share its internet access wirelessly with your friends device which of the f
    10·1 answer
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·2 answers
  • What will be the output of the following code snippet? token = False while token : print("Hello")
    11·1 answer
  • File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
    8·1 answer
  • Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
    9·1 answer
  • Briefly tell me what a PUT request does
    11·1 answer
  • Write a note on antispyware progrmaes?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!