state 4 & circumstances under which warm
booting of a computer may be necessary​

Answers

Answer 1

Answer:

to close an open application


Related Questions

Chris needs to modify the default bullets that are used in a nonnumbered list in Word.

Which method should he use?

Select the arrow next to the bullet list option in the Paragraph group.
Select the arrow next to the number list option in the Paragraph group.
Use the Styles group on the Home tab.
This cannot be done.

Answers

Answer:

Select the arrow next to the bullet list option in the Paragraph group.

Explanation:

This allows you to decide what shape of bullets you would like to have.

Hope this helps!

Note: I personally recommend using stars :)

Which option is used to insert a table in PowerPoint from another Office application?

In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.

Answers

Answer: In the Insert Object dialog box, choose Create from file.

Explanation:

To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.

After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations

Answers

Answer: Identifying sequences

Explanation:

Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.

In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.

Therefore, the best option is B.

The most likely reason a firm would decide to establish an extranet would be the desire to Multiple Choice speed the flow of information on its private network by increasing the bandwidth. make the information on its network widely available to the general public. share information and collaborate with a select group of outside organizations or individuals. overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.

Answers

Answer: share information and collaborate with a select group of outside organizations or individuals.

Explanation:

When a company uses an intranet, it is for the purpose of sharing information within the company so in the same vein, an extranet is done to share information with entities outside the company be it people or organizations.

For information to be shared, the other companies and organizations need to have the means and authorization to join the extranet. Extranets are very useful as they enable collaboration across vast distances thereby increasing productivity.

The most likely reason a firm would decide to establish an extranet is B. share information and collaborate with a select group of outside organizations or individuals.

An extranet simply means a controlled private network that allows customers, vendors, partners, suppliers, etc to gain information about a company.

Extranet is vital to share information and collaborate with a select group of outside organizations or individuals. It is usually a private part of a website.

Read related link on:

https://brainly.com/question/10156285

i was able to solve the question :))

Answers

Answer:

ill take the points anyway

Explanation:

write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)

Answers

Answer:

Following are the differences two the given questions:

Explanation:

DVD-R:

DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.

DVD-RAM:

This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.

Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?

Embed the chart.
Link the chart.
Insert the chart as a picture.
This cannot be done.

Answers

Answer:

the awnser is B

Explanation:

Answer:

B, Link the chart.

Explanation:

Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security

Answers

it’s exercise tax $5 tax on a cable television line

hope this helped

~ mo

Capital gains tax - 10% profits from sale of the house

Consumption tax - 6% tax on all sales

Excise tax - 5$ tax on cable tv line

Payroll tax - 15% tax to pay for social security

1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.

Answers

Answer:

It requires a formal letter.

Answer:

This would require a formal business letter, the type being a cover letter or inquiry.

Explanation: yes

write a note on antispyware progrmaes?​

Answers

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

Answer:

Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.

How many characters should a strong password have? four six eight ten

Answers

Answer:

I say it have to be aleast 8 to complete a strong password

Explanation:

it's common sense

Answer:

8

Explanation:

The more the better but ten too much

write chracteristics of all 5 generation of computer​

Answers

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

Answer:

The five generations of computer are characterized by electrical current flowing through the processing mechanisms listed below : The first within vacuum tubes The second within transistors The third within integrated circuits The fourth within microprocessors clips The fifth unveiled smart devices capable of artificial...

Explanation:

hope it is helpful to you

MiraculousNisha^_^

how to convert binary number into decimal number​

Answers

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

Audience centered public speakers are inherently sensitive to the

Answers

diversity of their audiences

Answer:

the diversity of their audiences

Explanation:

Helllllllllppppppppppp

Answers

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.

Answers

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press

Answers

Answer:

Printing Press

Explanation:

Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)

Therefore, the item that best represents technology transfer from the given answer choices is the printing press.

This is because, the printing press helped to print paper containing information which was sent from one location to another.

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworkers hotspot but is still unable to connect to the internet.What is the cause of the issue?

Answers

Answer:

Airplane mode has been set on the tablet.

Explanation:

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.

This is because the Airplane mode has been set on the tablet.

What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language

Answers

Answer:

A computer software application that translates a computer programming language into a binary computer machine language

Explanation:

ita in the answer

Answer:

c

Explanation:

im god

list three social implications of the wider range of piracy​

Answers

Answer:

Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.

a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)

b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.

c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?

d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.

Answers

Answer:

C

Explanation:

A driver that approaches a controlled intersection with a signal that is not working must:

Answers

You must stop at the intersection and proceed when you are aware that other turning or approaching vehicles,bicycles or pedestrians have stopped.

What is a status update?

A. An automatic enhancement to a computer's performance

B. Any new software that can be downloaded for free

C. A short post in which users write what they are doing

D. A news flash that announces new government posts

Answers

It should be letter c i hope this help let me know if you need help
the correct answer should be C above ^

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

Which unit of computer is used to processed data?​
Please help!!!!!!

Answers

[tex]Hello[/tex] [tex]There![/tex]

[tex]AnimeVines[/tex] [tex]is[/tex] [tex]here![/tex]

Is it Central Processing Unit?

[tex]HopeThisHelps!![/tex]

[tex]AnimeVines[/tex]

Answer:

Central Processing Unit (CPU)

Explanation:

The Central Processing Unit (aka CPU), is used to process the data.

What is binary number system? Why is it used in computer system?

Answers

Answer:

Computers depend mainly on binary because it’s more time efficient for them to so.

Explanation:

It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.

Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.

These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-

A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed

(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)

As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.

It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.

I nut bun is how binary liks bavlls

Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As

Answers

Answer:

Explanation:

#include <stdio.h>  

int main(void)  

{    

   int num, rem;

   printf("Enter a number: ");

   scanf("%d", &num);

   printf("Roman numerals: ");        

   while(num != 0)

   {

       if (num >= 1000)       // 1000 - m

       {

          printf("m");

          num -= 1000;

       }

       else if (num >= 900)   // 900 -  cm

       {

          printf("cm");

          num -= 900;

       }        

       else if (num >= 500)   // 500 - d

       {            

          printf("d");

          num -= 500;

       }

       else if (num >= 400)   // 400 -  cd

       {

          printf("cd");

          num -= 400;

       }

       else if (num >= 100)   // 100 - c

       {

          printf("c");

          num -= 100;                        

       }

       else if (num >= 90)    // 90 - xc

       {

          printf("xc");

          num -= 90;                                              

       }

       else if (num >= 50)    // 50 - l

       {

          printf("l");

          num -= 50;                                                                      

       }

       else if (num >= 40)    // 40 - xl

       {

          printf("xl");            

          num -= 40;

       }

       else if (num >= 10)    // 10 - x

       {

          printf("x");

          num -= 10;            

       }

       else if (num >= 9)     // 9 - ix

       {

          printf("ix");

          num -= 9;                          

       }

       else if (num >= 5)     // 5 - v

       {

          printf("v");

          num -= 5;                                      

       }

       else if (num >= 4)     // 4 - iv

       {

          printf("iv");

          num -= 4;                                                            

       }

       else if (num >= 1)     // 1 - i

       {

          printf("i");

          num -= 1;                                                                                    

       }

   }

   return 0;

}

write a short note about applications of computer

Answers

Answer:

Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......

Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive

Answers

Answer:USB drive

Magnetic storage

Optical drive

Explanation:

hope this helps

BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.

Answers

Answer:

Provide the basic interface for the hardware.

Explanation:

Other Questions
Please do this ASAP! No links, thank you! why did the French invade Italy in 1494? How did this event trigger Italy's political decline? How did the action of Pope Julius II and the ideas of Niccolo Machiavelli signify a new era in Italian civilization? How are gymnosperms in category gnetophyta usually pollinated?A. by windB. by handC. by insectsD. by water Whatis the value of In e^4 You observe a cell in a stained section of connective tissue. The cell has an indented nucleus and obvious cytoplasmic granules. Upon further testing, you determine that the granules contain histamine. This cell is most likely a(n) _____. Multiple choice question. mature neutrophil mast cell eosinophil B cell Enviro Company issues 10.50%, 10-year bonds with a par value of $430,000 and semiannual interest payments. On the issue date, the annual market rate for these bonds is 7.50%, which implies a selling price of 127.875. The straight-line method is used to allocate interest expense. 1. Using the implied selling price of 127.875. what are the issuers cash proceeds from issuance of these bonds? 2. What total amount of bond interest expense will be recognized over the life of these bonds? 3. What is the amount of bond interest expense recorded on the first interest payment date? Currently, your masks sell for $1 each. At that price you are able to sell 6000masks per week: A recent survey you conducted found that for every 10 centincrease in the price of the mask package you would sell 150 less mask packages.. What is 24/9 in simplest form It shows a lot in winter in America.Can someone change this sentence into Negative Form? NOMBRE DEL PUEBLO EN EL QUE HABLAN CON LA LENGUA CHACHIAYUDA PLIS Flag questionConsider the pressure and force acting on thedam retaining a reservoir of water. Suppose thedam is 500-m wideand the water is 80.0-mdeep at the dam, as illustrated below. What isthe average pressure on the dam due to thewater? In a nationwide survey conducted by a reputable research center, a sample of adults in a certain country were asked whether they favor a plan to break up a small collection of megabanks, which controlled about % of the banking industry; % of those sampled responded in the affirmative. According to the report, "the margin of sampling error is / percentage points with a % level of confidence." Find and interpret a % confidence interval for the percentage of all adults in the country who favor a plan to break up the megabanks. *Prepare a Mind Map on Birth of the Weimar Republic Thank you for all the help guys Drag each tile to the correct box.Match the hydrocarbon names and structural formulas.2-butene2-methylbutane2-butyneH1HC-HH HH1H-CC c C-H1 1HH HHHC-HH-C-CEC1HH21 Edmentum. All rights reserved. Labor and management at Leo Trucking cannot seem to agree upon a contract for the truck drivers. As each side contends that they are bargaining fairly, no agreement seems to be possible. The drivers are threatening to go on strike, and management knows that such a strike would prove to be costly. None of the parties involved in the dispute wants to reach a win-win agreement. They are each highly focused on their demands, which they would like to achieve, otherwise known as their ________ points. target tolerance focal distribution resistance Trent Inc. needs an additional worker on a multiyear project. It could hire an employee for a $88,000 annual salary. Alternatively, it could engage an independent contractor for a $95,000 annual fee. Trent's income tax rate is 21 percent. Required: Compute the annual after-tax cost of each option and indicate which minimizes the after-tax cost of obtaining the worker Find the value of x. A dependent variable is: Find the product (x - 10) ( x - 5)