1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
11

What is the correct order for the boot phases of a Linux computer?

Computers and Technology
1 answer:
galina1969 [7]3 years ago
6 0

BIOS

Boot loader

OS Kernel

Init

You might be interested in
9.11: Array Expander
vodka [1.7K]

The Array Expander is an illustration of arrays and functions.

  • Arrays are variables that stores multiple values
  • Functions are named statements that are executed when called

<h3>The Array Expander program </h3>

The Array Expander program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

//This declares the Array Expander function

int* ArrayExpander(int *oldArr, int size){

   //This declares the new array

   int *newArr = new int[size * 2];

//This iteration sets values into the new array

   for (int i = 0; i < size * 2; i++) {

       if(i < size){

           *(newArr+i) = *(oldArr+i);

       }

       else{

           *(newArr+i) = 0;

       }

   }

//This returns a pointer to the new array

   return newArr;

}

//The main method begins here

int main(){

//This declares the length of the array, N

   int N;    

//This gets input for N

   cin>>N;

   int initArr[N];

//If N is between 1 and 50

   if(N > 0 && N <=50){

//This iteration gets values for the array

       for(int i = 0; i<N; i++){

           cin>>initArr[i];

       }

//This calls the Array Expander function

   int *ptr = ArrayExpander(initArr, N);

//This iteration prints the elements of the new array

   for (int i = 0; i < N*2; i++) {

       cout << ptr[i] << " ";

   }

   }

  return 0;

}

Read more abou C++ programs at:

brainly.com/question/27246607

3 0
2 years ago
When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
Verizon [17]
The tilde operator represents the root directory of the website.
4 0
3 years ago
A driver that approaches a controlled intersection with a signal that is not working must:
nalin [4]
You must stop at the intersection and proceed when you are aware that other turning or approaching vehicles,bicycles or pedestrians have stopped.
5 0
3 years ago
how do you set up a slide show to play continuously, advancing through all slides without requiring your interaction? A. Click S
Archy [21]

Answer:

B. Click Set Up, Slide Show, and then select the Loop continously until 'Esc' and use timings, if present options.

Explanation:

PowerPoint presentation is a program which was developed by Microsoft. It is a platform which is used to create business presentation or educational presentations, etc.

In order to play the slide show continuously without our interaction, we need to do the following steps :

1. In the powerpoint presentation, we have to click  "Slide Show" tab in the ribbon and then click on the "Set up slide show" on the Set Up bar.

2. The set up slide show dialogue box will pop up. In this we have to  check or tick on the "Loop continuously until 'Esc' " in the "Show Option" and then click 'OK'

3. Now in the "Slides" preview side panel, we have to click the 1st slide , then Press and hold the 'Shift' key and then click the last slide. This selects all the slides.

4. Now, in the transition tab, in the "Timing" group, we have or uncheck or untick the " On Mouse Click " and also check the " After"

6 0
3 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Other questions:
  • Correspondence involves verbal communication. True False
    6·2 answers
  • Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
    12·1 answer
  • 1. When centering one paragraph on a page of text, the user needs to _____.
    15·2 answers
  • 1. What conversion factor should be used to convert from Gigaliters to liters?
    14·1 answer
  • Suppose that you want to write a program that inputs customer data and displays a summary of the number of customers who owe mor
    14·1 answer
  • Name the sections of an instruction.
    15·1 answer
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • What are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, r
    8·1 answer
  • Years ago when working a helpdesk, the most common question asked, almost daily, was about resetting passwords. What type of kno
    11·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!