1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
8

Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do

some touchup work before sending the pictures to her children. When Alice attached her phone to her computer, she saw that Windows detected her phone and tried to load the applicable software to give her access to her phone. Unfortunately, after trying for several minutes, Windows displayed a message indicting that it was unsuccessful. When Alice explored her available drives, her phone was not listed. Which of the following would be the BEST administrative tool to help Alice gain access to her phone?
A.) Services
B.) Component Services
C.) System configurations
D.) Device Manger
E.) Event Viewer
Computers and Technology
1 answer:
dmitriy555 [2]3 years ago
5 0

Answer:

<u>D.) Device Manager</u>

Explanation:

Indeed, the device manager administrative tool found on Windows allows the user to set up or add new hardware devices attached to the computer system.

For example, this tool allows the user to add external devices to the computer such as a printer, mobile device, etc that may not automatically be displayed.

You might be interested in
The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
sdas [7]

Answer:

import numpy as np

import matplotlib.pyplot as plt

def calculate_pi(x,y):

   points_in_circle=0

   for i in range(len(x)):

       if np.sqrt(x[i]**2+y[i]**2)<=1:

           points_in_circle+=1

       pi_value=4*points_in_circle/len(x)

       return pi_value

length=np.power(10,6)

x=np.random.rand(length)

y=np.random.rand(length)

pi=np.zeros(7)

sample_size=np.zeros(7)

for i in range(len(pi)):

   xs=x[:np.power(10,i)]

   ys=y[:np.power(10,i)]

   sample_size[i]=len(xs)

   pi_value=calculate_pi(xs,ys)

   pi[i]=pi_value

 

print("The value of pi at different sample size is")

print(pi)

plt.plot(sample_size,np.abs(pi-np.pi))

plt.xscale('log')

plt.yscale('log')

plt.xlabel('sample size')

plt.ylabel('absolute error')

plt.title('Error Vs Sample Size')

plt.show()

Explanation:

The python program gets the sample size of circles and the areas and returns a plot of one against the other as a line plot. The numpy package is used to mathematically create the circle samples as a series of random numbers while matplotlib's pyplot is used to plot for the visual statistics of the features of the samples.

4 0
3 years ago
Over time, programming languages have evolved in phases called ________.
Tju [1.3M]
Programming Languages have evolved in phases called generations.  The five generations of computers are : <span>First Generation (1940-1956) Vacuum Tubes. Second Generation (1956-1963) Transistors. Third Generation (1964-1971) Integrated Circuits. Fourth Generation (1971-Present) Microprocessors. <span>Fifth Generation (Present and Beyond) Artificial Intelligence.</span></span>     
6 0
3 years ago
Read 2 more answers
The blank contains the computer's brain the central processing unit CPU
Mila [183]

The Motherboard contains the computer's brain which is the Central Processing Unit (CPU).  It is the main circuit board for the computer, containing both soldered, non removable components along with sockets or slots for components that can be removed. The motherboard holds the CPU, RAM and ROM chips, etc.

7 0
3 years ago
Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
allochka39001 [22]

Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)  

4 0
4 years ago
Read 2 more answers
Exodia<br>Principle of Computer Operation​
tamaranim1 [39]

Answer:

????

Explanation:

6 0
3 years ago
Other questions:
  • if the president goes for vice president after his 2 term and the present president dies is the old president the president agai
    8·2 answers
  • What type of product does amd manufacture
    5·1 answer
  • What identifies available computers through the internet?
    14·1 answer
  • The mods have peanuts for brains (it's true, I lost like 1k points to them for no reason)
    12·1 answer
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • Which text features does this section contain? Check all that apply.
    15·1 answer
  • A different way of pronoucing the same words is called a _____
    15·1 answer
  • What is a computer modem?​
    9·1 answer
  • Simple interest will always pay more interest than compound interest.
    14·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!