1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
9

Anyone know howda set up a windows vista?

Computers and Technology
1 answer:
Mrrafil [7]3 years ago
7 0

Answer:

Step 1 – Place Windows Vista DVD in your dvd-rom drive and start your PC. ...

Step 2 – The next screen allows you to setup your language, time and currency format, keyboard or input method. ...

Step 3 – The next screen allows you to install or repair Windows Vista.

Explanation:

You might be interested in
Why will it take so long to complete the high-speed rail route?
koban [17]
It will take a while for all of the necessary safety inspections. 
3 0
3 years ago
Read 2 more answers
"where is a cookie that is created during a web site visit​ stored?"
tino4ka555 [31]
On the visitor's computer
5 0
3 years ago
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
4 years ago
Fill in the blank with the correct response.
Karo-lina-s [1.5K]

Answer:

logical

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following statements is false?
GrogVix [38]

Answer:

bnnnnn A1

Explanation:

bnnnnnjm

8 0
3 years ago
Other questions:
  • Two middle-order batsmen are compared based on their performance in their previous cricket match.
    7·1 answer
  • The search engine that makes it easy to find high-quality Web resources by combining Internet technology with traditional librar
    9·1 answer
  • This IDS defeating techniques works by splitting a datagram or packet into multiple fragments and the IDS will not spot the true
    8·1 answer
  • A series circuit contains a generator, two devices, and connecting wires. The resistances of the two devices are 15 ohms and 10
    10·2 answers
  • Which console was the first to use CD-ROM storage
    5·1 answer
  • When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c.
    5·2 answers
  • What is a current trend in ERP systems?
    12·1 answer
  • Complete the following statements by choosing the correct answer from the drop-down menus.
    6·1 answer
  • (true or false) A setter or getter method in object-oriented programming is an example of encapsulation.
    12·1 answer
  • Explain how you would set up a Demilitarized Zone on. You have 25 workstations and a server on your site. Explain what additiona
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!