which advanced boot option starts windows, but loads only the drivers necessary for basic functionality

Answers

Answer 1

Answer:

The correct answer is: The Safe Mode

Explanation:

Safe Mode is an advanced boot option available in Windows. It is of two categories:

Safe Mode  and Safe Mode with Networking (this option allows inter and intra network conectivity)

It is useful for troubleshooting a windows operating system to find out why it is dysfunctional.

It can be activated by pressing the F8 key as the Windows Operting system boots up, but not after.

Cheers!


Related Questions

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices.You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.Which solution should you implement?

Answers

Answer:

Host-based IDS

Explanation:

A host-based IDS is installed on a single host and monitors all traffic coming in to the host. A host-based IDS can analyze encrypted traffic because the host operating system decrypts that traffic as it is received.

Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly

Answers

Explanation:

1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem

2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.

The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:

One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.

In conclusion, the above method will be used for the troubleshooting.

Read related link on:

https://brainly.com/question/18275236

Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the process method may throw one of several exceptions. Write some code that invokes the process method provided by the object associated with processor and arrange matters so that your code causes any exception thrown by process to be ignored. Hint: use the catch (Exception ex) and do nothing under the catch clause.

Answers

Answer:

Following are the code to the given question:

try//defining a try block

{

processor.process();//defining an object processor that calls process method

}

catch(Exception e)//defining a catch block

{

}

Explanation:

In this question, the 'Try' and 'catch' block is used in which both the keywords are used to represent exceptions managed during runtime due to information or code errors. This try box was its code block which includes errors. A message queue catches the block errors and examines these.

In the try block, a method "process" is used which is create the object processor that calls the method.

What are the characteristics of an attachment in an email?
O The attachment will always appear in the body of the message.
O The paperclip icon indicates an attached file.
O Bold red type indicates an attached file.
O The attachment can only be viewed if it is in HTML format.

Answers

Answer : the paper clip icon indicates the attached file

Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals

Answers

Answer:

batch sequence check.

Explanation:

A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.

The steps for checking an event data within a batch using a batch sequence check include the following;

I. You'll enter a range of serial numbers of the document in a batch.

II. You'll enter each serially pre-numbered document one after the other.

III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.

¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

………………….... controls the operations like reading data from input devices, transmitting information to output devices and checking the components of a computer.​

Answers

Explanation:

hi the IP address of my colleague of mine that

what is storage unit in computer and five examples of storage units.

Answers

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

A Linux systems admin reported a suspicious .py file that ran on a daily schedule after business hours. The file includes shellcode that would automate Application Programming Interface (API) calls to a web application to get information. What type of script is executing this shellcode

Answers

Answer: Python script

Explanation:

Based on the information given in the question, the type of script that is executing this shellcode is the Python script.

The Python script is a file that contains codes that are written in Python. In such case, the file which contains the python script typically has an extension

which is ".py"' or ".pyw" when it's run on windows

Therefore, based on the information given, the answer is Python script.

The type of script used in executing the shellcode that would automate Application Programming Interface (API) calls to a web application to get information is called; Python Script.

The type of script required to execute the given shellcode is called a python script. This is because the Python script is simply defined as a file that contains a code which is written in Python.

Now, this file which contains the python script will have the extension ‘.py’. However, if it is being run on a windows machine, it could also be the extension ‘.pyw’.

Finally, to run a python script, all we need to do is to get a python interpreter that we will download and install.

Read more about python at; https://brainly.com/question/16397886

All of the following are true of functions except: Group of answer choices They define specific tasks that can be used at many points in a program A function call must specify the name and arguments of the function The definition of a function usually is visible to other functions The implementation of a function is hidden from the caller

Answers

Answer:

The definition of a function usually is visible to other functions.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

A parameter can be defined as a value that can be passed to a function. This value can be passed to a function either by reference or by value.

This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create classes or variables in a function, you can can set the values for their parameters.

Furthermore, the true statements about a function includes;

I. A function define specific tasks that reusable at many points in a program.

II. The name and arguments of the function must be specified by a function.

III. The implementation of a function is generally hidden from the caller.

what can be the maximum possible length of an identifier 3163 79 can be of any length​

Answers

Answer:

79 characters

Explanation:

The programming language is not stated, but a little search online shows the question is about python programming language

Literally, identifiers are the names given to variables, arrays and functions.

In most programming languages (e.g. python), identifiers are case-sensitive.

i.e. Abc is a different identifier when compared to abc.

Having said that, python allows up to 79 characters to name an identifier.

Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.

state the use of an x-ray machine​

Answers

Answer:

The use of an x-ray machine is used to take pictures of dense tissues such as teeth or bones. This is because bones absorb the radiation more than the less dense soft tissue. X-rays from a source pass through the body and onto a photographic cassette.

I hope this helps you!

Explanation:

algo de La historia de los productos tecnologicos

Answers

Answer:

La tecnología se define como la suma de técnicas, habilidades, métodos y/o procesos utilizados y utilizados en la producción de bienes, productos o servicios, o para lograr objetivos clave de la investigación científica.

Precisamente, la tecnología se define como la aplicación del conocimiento científico con fines prácticos, especialmente en la producción industrial. Un significado secundario de la palabra se refiere al desarrollo de dispositivos y mecanismos con fines científicos y está directamente relacionado con las artes aplicadas, las ciencias aplicadas o la ingeniería. A veces se refiere a la metodología que caracteriza tal proceso. En los últimos años ha existido una tendencia a que el concepto se refiera únicamente a la alta tecnología y / o tecnología informática, aunque básicamente no se limita a estas áreas. Por ejemplo, tanto la Estación Espacial Internacional o una computadora pueden ser tecnología, también pueden ser un abridor de botellas estándar. A menudo, el objeto de la tecnología con beneficios prácticos no es el producto de la investigación científica, sino el resultado de un descubrimiento accidental.

In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.

Answers

Answer:

focuses on a certain subject

Explanation:

it means that it focuses on that one subject and none others

Hope it helps c:

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet. True False

Answers

Answer:

True - Firewalls are software programs/hardware devices designed to keep computers safe from hackers

your organization has multiple remote offices. the users at the remote office often remotely connect to the application servers. which of the protocols should you enforce for encrypted communicationa

Answers

Answer:

RDP

SSH

Explanation:

RDP and SSH can both be used for remote encrypted communication. RDP protocol( called remote desktop protocol) is owned by Microsoft. It allows it's user access to the network through a GUI RDP software that allows you to connect to another computer on the network, the client server. RDPs operate over encrypted channels and is therefore secure.

SSH(called secure shell protocol) is used on Unix like OS systems to connect over unsecured network. SSH uses cryptographic encryption that increases security for it's client-server architecture. It's an improved version of RSH and Telnet which didn't make use of encryption when sending data over the network.

You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?

Answers

Answer:

There must be a  proxy server that is not allowing access to websites

Explanation:

A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files.You want the connection to be as secure as possible. Which type of connection will you need?

Answers

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creating/copy the documents?

Answers

Answer: Yup!

If you'd rather take a picture with your phone, just back transfer the photos into your computer if necessary.

there are....... section in
cpu

Answers

Explanation:

The CPU is made up of three main components, the control unit , the immediate access store and the arithmetic and logic unit .

When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variable

Answers

Answer:

The value of the primitive type variable is passed into the receiving method

Explanation:

Examples of primitive data types are integers, floats, real, double, character, byte, etc.

When any of these data types variables are passed to a method, the method which receives the variables receives the value of the variable being passed.

Take, for instance; the following code segment:

int doubleNum(int num){ ..... }

int main(){ ... num = 2; doubleNum(num);}

The above function doubleNum will receive the value of num (which is 2).

Write a python application that allows a user to enter any number of student test scores until the user enters 999. If the score entered is less than 0 or more than 100, display an appropriate message and do not use the score. After all the scores have been entered, display the number of scores entered and the arithmetic average.

Answers

Answer:

This program is as follows

total = 0; count = 0

testscore = int(input("Score: "))

while testscore != 999:

   if testscore < 0 or testscore > 100:

       print("Out of range")

   else:

       total+=testscore

       count+=1

   testscore= int(input("Score: "))

print(count,"scores entered")

print("Arithmetic Average:",total/count)

Explanation:

This initializes total and count to 0

total = 0; count = 0

This gets input for score

testscore = int(input("Score: "))

The following iteration stop when 999 is entered

while testscore != 999:

This prints out of range for scores outside 0 - 100

   if testscore < 0 or testscore > 100:

       print("Out of range")

Otherwise

   else:

The total score is calculated

       total+=testscore

The number of score is calculated

       count+=1

Get another input

   testscore = int(input("Score: "))

The number of score is printed

print(count,"scores entered")

The average of score is printed

print("Arithmetic Average:",total/count)

MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations

Answers

Answer:

economical reasons

Explanation:

A metropolitan area network (MAN) is formed by an aggregation of multiple local area network (LAN) that are interconnected using backbone provided by an internet service provider (ISP). A metropolitan area network (MAN) spans for about 5 kilometers to 50 kilometers in size.

Basically, a metropolitan area network (MAN) spans across a geographic area such as a city and it's larger than a local area network (LAN) but significantly smaller than a wide area network (WAN).

Hence, a wide area network (WAN) is designed to span over a very large geographical area and as such would cost more in implementing than a metropolitan area network (MAN) would cost.

This ultimately implies that, metropolitan area network (MAN) speeds are faster than WAN speeds because of economical reasons.

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.


4. What are the things that a computer literate understands?name them

Answers

[tex]{\blue{OII}}[/tex]

[tex]{\green{TUDO}}[/tex] [tex]{\red{BEM ?}}[/tex]

The activities that the computer scientist develops Data structuring, development and design. CG. Numerical analysis and development of algorithms. Database management. CG.

[tex]{\red{TCHAU }}[/tex]

❤❤

With ok g hey Ed F egg to TK up TK A

Analizar los componentes de una computadora completa hoy en día comparada con el inicio de la Informática.

Answers

Answer:

Explanation:

Las computadoras que existian en el inicio de la informatica y las que existen ahora tenian los mismos componentes. Estos eran CPU, Placa Madre, RAM, HDD, y tarjeta grafica. Lo que si cambio fueron el velocidad y capacidad. Por ejemplo, en el inicio las Tarjetas de RAM venian como DDR a una velocidad maxima de 133 Mhz con una capacidad de entre 4mb y 8mb. Hoy en dia tenes RAM de DDR5 con una velocidad de 4400 Mhz y de 8gb. Mientras que avanzaba el tiempo los componentes de las computadoras aumentaban en velocidad y capacidad aunque el tamaño bajaba o aumentaba dependiendo del gusto del usario.

When an application has multiple uses what is it known as?
A. Minimum Features
B. Full Featured
C. Limited Features
D. Maximum Features

Answers

B.Full featured application

c724 wgu True or false. A storage device consists of all the components that work together to process data into useful information

Answers

Answer:

False

Explanation:

A output device consists of all the components that work together to process data into useful information

Other Questions
Which of the following is an independent clause?A. A juicy green appleB. I went homeC. After a whileD. In the heat of the moment GIVE AN EXPLANATION PLEASE! A BRAINLEEST IF TWO OR MORE PEOPLE HAVE ANSWERED IT. (FIRST COME FIRST SERVE BASES + ANSWER HAS TO BE CORRECT)Lily bought a pair of gloves and a shirt.The gloves cost 4She sold the gloves and the shirt for a total of 48She made 100% profit on the cost of the gloves.20% profit on the total cost.Work out her percentage profit on the cost of the skirt.Answer 1 decimal place. what happens to the force when the distance increases between 2 particales Online presentations will always be either synchronous or asynchronous but never both.A. TrueB. FalseNEED HELP ASAP PLEASE HELP Given the function f(x) = 4x + 10 and g(x), which function has a greater slope?x g(x)2 54 76 9 f(x) has a greater slope. g(x) has a greater slope. The slopes of f(x) and g(x) are the same. The slope of g(x) is undefined. Look at the diagram. Which angle is supplementary to 1.) 2.)3.)4.) Why did the United States decide to get involved in the Korean War?to colonize the Korean peninsulato continue its war against Japanto contain the spread of communismto gain a presence in Southwest Asia Question 1 of 20Which of the following was a result of the low wages paid by factories in thelate 1800s?A. An increase in child laborB. A decrease in labor unionsC. A decrease in working hoursD. An increase in the price of goodsSUBNE explain the following terms copyleft:creative Commons:GNU/GPL: What is the rocket name which first landed on moon?1.Una 12.Nasa3.Luna4.Luna 2 what is an effective technique for two way communication What was the underlying cause of the Cold War? PLSSS I REALLY NEED HELP RIGHT NOW!! 20 POINTSS?? A(8x - 5) in.BThe perimeter of parallelogram ABCD is 46 inches.What is DA?03 inO 4 in8 in.O 19 inD(3x + 10) in[Not drawn to scale] i need help asap. rn Need a little help with this one Two stores sell CDs in packages, as shown in the table below.CD Prices at Store ANumber of CDs in Package1122045Cost$0.70$8.40?$31.50CD Prices at Store BNumber of CDs in Package1203065Cost$0.60?$18.00$39.00If the rate at each store is constant, which statement correctly compares the cost of a package containing 20 CDs? The cost at Store A is $2.00 greater than at Store B.The cost at Store B is $2.00 greater than at Store A.The cost at Store A is $1.00 greater than at Store B.The cost at Store B is $1.00 greater than at Store A. 1. In the spring of 2017, the Consumer Reports National Research Center conducted a survey of 1007 adults to learn about their major health-care concerns. The survey results showed that 574 of the respondents lack confidence they will be able to afford health insurance in the future. Develop a 90% confidence interval for the population proportion of adults who lack confidence they will be able to afford health insurance in the future. PLEASE HELP ASAP! Cynthia bought a bag of wafers weighing 543 grams. There are about 0.035 ounces in 1 gram. About how many ounces does thebag of wafers weigh?OA.15.51B. 0.035C. 0.64OD19.01 One number is 10 less than three times a second number. If their sum is 46, find the larger of the two numbers.