1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
2 years ago
6

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should

you create
Computers and Technology
1 answer:
aleksley [76]2 years ago
7 0

There are different kinds of installations of system software. If you wish to install a new OS, the type of boot setup that one should create a dual.

A dual boot, or multiboot when used, allows one to be able to install a new OS without hindering the activity of the old one, so that one can boot to either OS.

Multi-booting is simply known as the process whereby a person installs multiple operating systems on a single computer, and being able to choose which one to boot.

Dual-booting is a very common configuration that is known to all. It pertains to two operating systems.  

See full question below

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?

dual

cross

controlled

Learn more about dual boot from

brainly.com/question/13483046

You might be interested in
What safety do you need to have ready to start a device repair?
lorasvet [3.4K]

Answer:

Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.

7 0
2 years ago
An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i
a_sh-v [17]

Answer: Closed port

Explanation:

Port 23 basically refers to the telnet which provide very severe services and it is used to access the server remotely. We should always closed the port 23, when we are not using telnet services because to prevent it from being hacked due to the port scanning.

As, now a days it is rarely used by the hackers as it is difficult to access this services from the server.

Therefore, Closed port is the correct answer.

3 0
3 years ago
How can you tell that a website is valid and reliable 10 points
Dmitry_Shevchenko [17]

Answer:

if it uses the CARS checklist

6 0
3 years ago
Which is a description of phishing?
kodGreya [7K]

Answer:

C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information

7 0
3 years ago
Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
Alexxandr [17]

Answer: name, file stream object

Explanation:

4 0
2 years ago
Other questions:
  • Dr. Laos gets a referral for a 6 month old who has become listless and stopped eating lately. Her pediatrician wanted her to be
    15·1 answer
  • HURRY UP !!!!!!’<br> Each packet is addressed to the recipient's .
    8·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    7·1 answer
  • Implement function bin2dec that takes a binary number bin_num as a string argument and prints out the corresponding decimal numb
    9·1 answer
  • In which situation is coauthoring of presentations primarily utilized?
    9·1 answer
  • Im drinking coffee. and working on school and watching a show. Whos with me?
    9·1 answer
  • In which drawer do you find blocks that allow you to use the A and B buttons on your micro:bit?
    13·2 answers
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Mario kart is mercedes lol
    13·2 answers
  • List at least 5 disadvantages caused by computer viruses?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!