1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
6

What is booting in computer​

Computers and Technology
2 answers:
nirvana33 [79]3 years ago
5 0
Booting a computer today means turning it on or selecting Restart. In the early days of computing, booting required pressing several buttons at the console. Put Your Boots On! The term comes from "bootstrap." Since bootstraps help you get your boots on, booting the computer helps it get its first instructions.
melisa1 [442]3 years ago
3 0

Answer:

<em>Booting </em><em>c</em><em>o</em><em>m</em><em>p</em><em>u</em><em>t</em><em>e</em><em>r</em><em> </em>

<em>is the process of restarting a computer or its operating system software.Booting is of two types :</em>

<em>1. Cold booting: When the computer is started after having been switched off.</em>

<em> 2. Warm booting: When the operating system alone is restarted after a system crash or freeze.</em>

hope this help you

You might be interested in
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Karo-lina-s [1.5K]

Answer:

To avoid collision of transmitting frames.

Explanation:

CSMA/CA, carrier sense multiple access is a media access control protocol of wireless networks that allows for exclusive transmission of frames and avoidance of collision in the network. When a frame is not being sent, nodes listening for an idle channel gets their chance. It sends a request to send (RTS) message to the access point. If the request is granted, the access point sends a clear to send (CTS) message to the node, then the node can transmit its frame.

Many nodes on a wireless network are listening to transmit frames, when a frame is transmitting, the node has to wait for the access point to finish transmitting, so it sends a RTS message again to exclusively transmit a second frame.

8 0
4 years ago
From the start screen you can
sergey [27]
Shut down, restart, sign out, lock computer, sleep, open programs
8 0
3 years ago
Read 2 more answers
What are the core components of a computer system?
Fantom [35]
CPU GPU harddrive ram
6 0
3 years ago
The three main types of banks (Large Traditional, Credit Union, Online or Online-Only) have many tradeoffs with respect to techn
Margarita [4]
So from a little research, this is the order:
Online Bank, Credit Union, Traditional Bank

Online bank is the highest one since it uses technology like the internet to transfer money or to pay bills easily.
Credit union is same as an online bank where it also uses internet offering mobile and online banking services.
Traditional bank is the most common type of bank. They also offer mobile banking but they still use the old procedure of banking like depositing and withdrawing money, face to face.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is
    5·1 answer
  • Changing the color of my avatar using a computer program is ok since it doesn't impact anyone else
    12·1 answer
  • Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
    12·1 answer
  • Asp.net is a Microsoft product?
    6·1 answer
  • The program evaluation and review technique (PERT) is __________. a. a network-based technique in which there is a single time e
    15·1 answer
  • In Microsoft Word you can access _ the command to the mini toolbar
    14·2 answers
  • The person that includes the most and funniest memes (screenshot from the web) gets brainliest.
    5·1 answer
  • Irma bought a gaming computer at Bestbuy 3 years ago and it’s been on ever since. Her computer is staring to feel unstable and a
    10·1 answer
  • Pictures in the _____ gallery give the appearance of a physical object, such as water drops or sand, that can give your presenta
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!