1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
6

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should

you create
Computers and Technology
1 answer:
aleksley [76]3 years ago
7 0

There are different kinds of installations of system software. If you wish to install a new OS, the type of boot setup that one should create a dual.

A dual boot, or multiboot when used, allows one to be able to install a new OS without hindering the activity of the old one, so that one can boot to either OS.

Multi-booting is simply known as the process whereby a person installs multiple operating systems on a single computer, and being able to choose which one to boot.

Dual-booting is a very common configuration that is known to all. It pertains to two operating systems.  

See full question below

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?

dual

cross

controlled

Learn more about dual boot from

brainly.com/question/13483046

You might be interested in
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
ycow [4]

Answer:

Promiscuous mode

Explanation:

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…

✓ Promiscuous mode

7 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
2 years ago
How to turn off life360 without parents knowing on iphone
taurus [48]

Answer: Launch AnyGo. Once you download the AnyGo latest version, you can double click on the setup and install it on your PC.

Connect iPhone to the PC. Now take your iPhone and connect to the PC that you installed, AnyGo. ...

Check the current location. ...

Find the destination. ...

Teleport to the location. ...

6 0
3 years ago
Which is the most used operating system? A. Windows B.Linux C.Leopard D. DOS
Neko [114]
I think it´s either A. or  B.
7 0
3 years ago
Read 2 more answers
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
Other questions:
  • What does delegating access give someone the permission to do on behalf of the user? Choose two answers.
    5·1 answer
  • What is basic function of an operating system?
    10·2 answers
  • A disadvantage of ethernet??
    6·1 answer
  • In the Happy Valley School System, children are classified by age as follows:less than 2, ineligible2, toddler3-5, early childho
    6·1 answer
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • In this class, it is very common for your computer screen to look like this. What is this?​
    5·1 answer
  • Gun to yo head any last words??
    10·2 answers
  • PLEASE HELP!!!!!! ASAP
    6·2 answers
  • Write a C function named apply_all that expects two arrays of integers and their sizes and dynamically allocates a new array of
    7·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!