1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
5

what is the set of events that occurs between the moment you turn on the computer and the moment you can begin to use the comput

er
Computers and Technology
1 answer:
kkurt [141]3 years ago
8 0

Answer:

Booting

Explanation:

Booting is the process that occurs when you press the power button to turn your computer on. During this process (which may take a minute or two), the computer does several things: It runs tests to make sure everything is working correctly. It checks for new hardware.

You might be interested in
Who want to be my friend
Tanya [424]

Answer:

I willl be your friend

Explanation:

Ther is no explanation

8 0
3 years ago
Read 2 more answers
Describe how you could obtain a statistical profile of the amount of time spent by a program executing different sections of its
Mazyrski [523]

Answer:

Explanation:

It can be said that the best way to obtain such a statistical profile would be to issue a periodic timer interrupt, then you would simply need to monitor which what code was running when the interruption took place. This information is especially helpful to the programmers as it would allow them to optimize the specific sections of the code that are consuming the most CPU resources, and thus making the overall program more efficient.

7 0
3 years ago
You decide to store data in the user's browser in order to reduce the amount of data that must be downloaded. What is this proce
Lemur [1.5K]

Answer:

client-side storage

Explanation:

The process of doing this is known as client-side storage. Like the name suggests this saves data that is sent to the user's computer on that computer either as cookies or cached data. This data is then used every time that the user decides to enter the same website or access the same program from the browser. Doing this allows these websites and programs to load much faster the more times that the user decides to enter them.

5 0
3 years ago
Select the four tactics that cyber criminals use for stealing information from the list below.
Snowcat [4.5K]
Baiting clickjacking pharming spamming
6 0
2 years ago
Buying a house is most likely a long-term goal for a person of which of these
vekshin1

Answer:

B  i think

Explanation:

5 0
4 years ago
Other questions:
  • Tool such as microsoft’s ____ are helping to bridge different platforms and programming languages.
    6·1 answer
  • Determine and prove whether an argument in English is valid or invalid. About Prove whether each argument is valid or invalid. F
    5·1 answer
  • The CPU converts into information. The CPU is the mastermind of the computer, controlling everything that goes on through a seri
    12·2 answers
  • A. True
    13·1 answer
  • A key tactic that is used in many attacks, but very frequently in CEO Fraud, is creating a sense of what?
    15·2 answers
  • What does the windows update feature allow you to do?
    7·2 answers
  • Which option identifies the type of engineers described in the following scenario?
    6·1 answer
  • Write a program which will -
    14·1 answer
  • Difference between software developer and software engineer.
    6·1 answer
  • What are the answers to these Python programs
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!