1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
2 years ago
10

How does knowledge of disk management assist in terms of increasing systems performance 10marks

Computers and Technology
1 answer:
AlexFokin [52]2 years ago
4 0

Answer:

<h3>bagaimana pengetahuan tentang manajemen disk membantu dalam hal meningkatkan kinerja sistem 10marks</h3>
You might be interested in
If you were a developer of software, what kind of software package would you develop? why ?​
Goshia [24]

Answer:

Software that would help my grandparents in the North end much money and help stop post harvest loss due to inadequate weather information Climate change etc

Explanation:

The app willbe able to tellif a soil is suitable forCropsthrough my othertechnologiesthat willcome with app it will alsodetect the whetherpattern accuratelyprovide securityin the farmand help farmers selltheir products online

7 0
3 years ago
what is the difference between the registry and server manager in reference to its management/configuration ?
Ksivusya [100]

Explanation:

Server manager perform various types management tasks in Microsoft window to manage remote severs without require any physical access. It enable remote desktop connection protocols. It basically use server manager for manage the server remotely.

Registry is very important as it store essential information about the window system and about its configurations. It is mainly use in Microsoft window for operating its system and applications. It also store low level settings in the system.

6 0
3 years ago
The purpose of the trusted platform module is:
Elza [17]
A Trusted Platform Module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. Each TPM chip contains an RSA key pair called the Endorsement Key. The pair is maintained inside the chip and cannot be accessed by software.
6 0
3 years ago
Read 2 more answers
Assume 151 and 214 are signed 8-bit decimal integers stored in two’s complement format. Calculate 151 + 214 using saturating a
poizon [28]

Answer:

-128

Explanation:

(151)_{10}

We have to convert this decimal number into the binary number

(10010111) _{2}

Performing the 2's complement number so we have to subtract 1 from this

10010111 -1 \\=(10010110)_{2}

Now to getting the original number we have to complement the previous number it means convert 1 ->0 and 0 -> 1

(10010110)_{2} ---->(01101001)_{2}

The previous number is converted binary to decimal we get ,

(01101001)_{2}=(105) _{10}

-105(According to the rule of 2's complement )

Similarly same process will apply on the (214)_{10}

We have to convert this decimal number into the binary number

(11010110)_{2}

Performing the 2's complement number so we have to subtract 1 from this

11010110 - 1 =(11010101)_{2}

Now to getting the original number we have to complement the previous number it means convert 1 ->0 and 0 -> 1

(11010101)_{2}---------> (00100101)_{2}

The previous number is converted binary to decimal we get ,

(00100101)_{2}------->(42)_{10}

-42(According to the rule of 2's complement )

Therefore the result is

151 + 214

=(-105 + (-42)

=-147

Hence the -147 is smaller then -128 that is smaller 8 bit signed integer is Therefore result is : -128

7 0
3 years ago
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
Other questions:
  • Python Write a program that asks the user for an integer and then prints out all its factors.
    12·1 answer
  • A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
    12·1 answer
  • When a computer is booted the checks the computer's components?
    7·1 answer
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • By observing human behavior,_______are able to understand the cause and effect relationship between the supply of things we want
    13·2 answers
  • Write a complete method from the client perspective that duplicates each element in place in a ListInterface object. For example
    8·1 answer
  • Write a function float Average(int, int) that finds the mean, and then write a main program that inputs two numbers from the use
    7·1 answer
  • Please help me what is an example of a growing trend on social media
    9·1 answer
  • 3. Encode these sentences in ASCII: a. "Stop!" Cheryl shouted. b. Does 2 + 3 = 5?​
    6·1 answer
  • What’s unique about New Cashierless stores?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!