1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
2 years ago
11

You should periodically perform basic computer maintenance on your computer. True False

Computers and Technology
2 answers:
kotegsom [21]2 years ago
8 0

Answer:

that's true after some period of time it's necessary

nika2105 [10]2 years ago
3 0

Answer:

the answer will be true ......

You might be interested in
What is the meaning of 4 8 15 16 23 42?
Delicious77 [7]
The Numbers. ...The numbers 4<span>, </span>8<span>, </span>15<span>, </span>16<span>, </span>23<span> and </span>42<span> frequently recurred in Lost. Each corresponded with one of the final candidates to replace Jacob as protector of the Island. The numbers also formed the coefficients in an equation that predicted mankind's extinction.</span>
5 0
3 years ago
Which Of The Following Is A College Major For Which IT Courses Would Most Likely Be Required?
german

Answer:

Most likely computer science, however we cant see the options so i dont know but if that is not one of the options then the answer will most likely be engineering

Explanation:

3 0
3 years ago
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
Korolek [52]

Answer:

- agitator hacktivist

Explanation:

There are various terms which are described below:

activist cyber: when a person uses online campaigning by non-violation means like social media or other online platforms to create their activism is known as activist cyber.

agitator hacktivist: when a person uses illegal ways to bring change in political point by hacking or theft the information from the internet or bring the system down is known as agitator hacktivist.

ethical hacker: when a person uses legal ways to make a system safe from any type of malicious attack by removing the weakness of the system is known as the ethical hacker.

cybersquatter: when a person buys a domain name with the vision of selling it to the company needed it at very high prices, it is known as a cyber squatter.

so, according to the scenario the most appropriate answer is agitator hacktivist.

4 0
3 years ago
Should I learn Python, C++, C# or VB to start off programming games for Windows. Open to other language recommendations as well!
Svetllana [295]
In theory, you can of course use any language you like, but there are a few commonly used ones.
From your list it would be c++ or c#, because if you actually have the interest long term then those will be the languages used by the various "big"/well known/used engines.
I would suggest c#, because it can be used with the Unity engine, which has an enormous community with help resources especially to start out and learn to program or game development.
On the other hand I would also suggest JavaScript. It isn't used for any of the big title development, but for all the *.io games like slither and so on. When looking at such games you will quickly notice that they are generally much simpler (for example 2D not 3D), because game engines are just simpler in JavaScript. While this is obviously limiting it might help to get something simple actually working, instead of getting stuck in extra complexities and additional features until you lose your motivation.
The basic programming you learn is still the same, so after you have learned a language you can quickly pick up most others.
<span />
7 0
3 years ago
Why is art important to heritage?
Sophie [7]
<span>but of culture, values and traditions. Cultura</span>
7 0
3 years ago
Other questions:
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • Consider this data sequence: "fish bird reptile reptile bird bird bird mammal fish". let's define a singleton to be a data eleme
    5·1 answer
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • What is the acronym that helps you remember the order of math operations?
    9·2 answers
  • A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
    12·1 answer
  • Which of the following is not a hazard a driver might encounter?
    5·1 answer
  • Fun with Characters
    7·1 answer
  • Which of these would be the fastest transition duration?
    6·2 answers
  • Answer the following 8-mark question in your book.
    15·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!