Answer:
1. Best way is to get the manual from the manufacturer. Each manufacturer places the laptop components in different locations and have different methods of securing the components. Dell does a great job in publishing a manual for repair of each component with detailed locations and step-by-step instructions.
2.. You can use an external monitor to test this - assuming the laptop has a external connection (HDMI, DisplayPort, VGA). If the external monitor works, you know the laptop's monitor is the problem. If the external monitor does not work it is likely the display adapter.
3. Failed internal input components can be substituted using external devices. The laptop will have USB connections that can be used for mice, keyboards, network cards, sound cards, and monitors.
4. The main thing to ensure for compatibility is the I/O bus type. SATA / ATA / IDE (older) must be matched to ensure the new drive will work. Look on the label of the old drive to see the specifications. Most modern laptops will user SATA as the I/O connection - both solid state drives and traditional platter based. As long as the I/O bus connection works, you can modify the speed and capacity of the drive with no major issues.
5. It depends on the model, but the majority of the internal components will require removal of the keyboard for access. This includes the system board, video card, network card, sound card, and hard drive. Memory is the one component that the manufacturer will often allow for replacement / addition through an access port on the bottom (but not every manufacturer does this - i.e. Apple)
6. Touchpad problems can be the result of foreign material on the pad (grease, oil, etc), or damage to the pad surface. If cleaning the pad thoroughly or rebooting the computer does not help then you might be looking at a component replacement. Resetting the device drivers can also be attempted.
Explanation:
Using touch or mouse to move or copy cells is calLed_______.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
Using touch or mouse to move or copy cells is called Drag and Drop.
It can be called dragging when moving, or dragging or filling when copying. If you are using Fill Handle, you are filling, but you can also drag to copy something to a non-contiguous location with the mouse, while holding the Ctrl key.
What is revising?
UMMM ye I
Answer:
Revise a manuscript again in order to make corrections or improvements. Revision is a process in the writing of rearranging, adding, or removing paragraphs, sentences, or words. During the writing process or after a draft is completed, writers may revise their work.
Explanation:
12 points. Fiona is starting to utilize the protection capabilities of Excel 2016. For the Lock or Unlock Cells function to work, which option should be enabled?
The Protect Workbook function needs to be enabled.
No functions need to be enabled other than the lock or unlock cells options.
The worksheet must be saved before the cells will become locked or unlocked.
The Protect Worksheet function needs to be enabled.
Answer:
The answer is D
Explanation:
just took the test on ed
In Microsoft Excel 2016, for the Lock or Unlock Cells function to work: D. The Protect Worksheet function needs to be enabled.
Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., to avail its end users the ability to analyze and visualize spreadsheet documents.
In Microsoft Excel, a Lock is used to prevent the editing and deleting of data stored in specific cells and ranges in a protected worksheet.
On the other hand, the Unlock Cells function allows data stored in specific cells and ranges in a protected worksheet to be edited and deleted.
In conclusion, Fiona must enable the Protect Worksheet function for the Lock or Unlock Cells function to work in Microsoft Excel 2016.
Read more: https://brainly.com/question/14299634
differences between the first four generations of computers
Answer:
Explanation:
These first generation computer were mainly used for scientific computations. Some examples of these computers are ENIAC, EDVAC, EDSAC, UNIVAC I and IBM 701.
five aplications of ict
Answer:
MS Word, MS Excel, MS PowerPoint, Adobe Photoshop, Adobe Reader
Explanation:
what is the use of a router
Answer:
Hope This Helps
A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node.
Explanation:
Answer:
It connects multiple devices together.
It transmits data to it's correct destination on a network through a process known as routing.
Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function howManyEven to find the total number of even elements in the array. It should have input parameter array arrayIntValues. The function should return an integer.
Answer:
Follows are the method definition to this question:
int even(int A[MAX_ROWS][MAX_COLUMNS], int length,int width)//defining a method even,that accept 2D array and two integer variables
{
int E_num = 0;//defining an integer variable E_num that holds a vlue 0
for (int i = 0; i < length; ++i)//declare for loop for row count
{
for (int j = 0; j < width; ++j)//declare for loop for column count
{
if(A[i][j]%2 == 0 )//use if block that check even number in array
{
E_num++;//incrementing the value of E_num
}
}
}
return E_num;//return E_num value
}
Explanation:
In the above code, a method "even" is defined, which accepts a 2D array "A" and two integers " length and width" in its parameter.
Inside the method, an integer variable "E_num" is defined that uses two for loop and an if block for the count the even numbers which are available on the 2D array.
please find the attahced file for method ouput.
4.11 LAB: Remove gray from RGBSummary: Given integer values for red, green, and blue, subtract the gray from each value.Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray).Given values for red, green, and blue, remove the gray part.Ex: If the input is:13050130the output is:80 0 80Find the smallest value, and then subtract it from all three values, thus removing the gray.Note: This page converts rgb values into colors.LAB
Answer:
Written in Python
rgb = []
colr = []
for i in range(0,3):
inp = int(input("Input: "))
if (inp >=0 and inp<=255):
rgb.append(inp)
else:
print("Range is 0 to 255")
exit()
colr.extend(rgb)
rgb.sort()
for i in range(0,3):
print(colr[i] - rgb[0])
Explanation:
The next two lines declares two empty lists
rgb = []
colr = []
The following iteration lets user input into rgb list
for i in range(0,3):
inp = int(input("Input: "))
if (inp >=0 and inp<=255):
rgb.append(inp)
else:
print("Range is 0 to 255")
exit()
This line copies the content of rgb to colr
colr.extend(rgb)
This line sorts list rgb
rgb.sort()
This iteration calculates and prints the difference between each individual input and the smallest of the inputs
for i in range(0,3):
print(colr[i] - rgb[0])
another one please tysm
Explanation:
5-blue
6-Mixing primary colors creates secondary colors. for example: if you mix blue and yellow, you get green
7- orange
8- shape
What would be the most important data to access in the HRIS for the units and divisions of the MNE to determine feasible HR programs
The most important data to access in the HRIS to determine feasible HR programs is personnel cost.
What is HRIS?HRIS is an acronym for human resource information system and it can be defined as a software system that is designed and developed, so as to help a business firm to collect, manage, and store detailed data on its employees or workers.
Generally, the important data to access in the human resource information system (HRIS) system for the units and divisions of the multinational enterprise (MNE) to determine feasible HR programs is personnel cost because it would affect the total amount of money that would be spent in training them on how to use the latest technology in the market.
Read more on HRIS here: https://brainly.com/question/23264557
PLEASE HURRY!!!!
What will be the output of the following program? Assume the user responds with a 5.
answer = input ("How many hamburgers would you like? ")
priceBurger = 3.00
moneyDue = answer * priceBurger
print ("You owe $", moneyDue)
A) An error occurs.
B) You owe $moneyDue
C) You owe $15.0
D) You owe $15
Answer:
The output will be you owe 15.0 dollars
Explanation:
Answer:
A. An error occurs
Explanation:
See attachment
PLEASE HELP ASAP IT'S DUE TODAY! WILL GIVE BRAINLIEST, FIVE STARS, AND THANKS!! PLEASE HELP!
Answer:
Tell the manufacturer to work on the airbags.
Explanation:
The airbags are one of the best life-saving devices, for example if you were in a car crash, airbags would save you from the glass shards, hitting your head against something in the car and falling unconscious, etc.
Who is the traitor of UA?
1 Karishma
2 Yuga Aoyama
3 Denki
4 Mineta
Answer:
your answer is yuga Aoyama
Match the following C# terms:
Click event___
Focus___
Access Specifier___
Runtime___
Node___
AcceptButton___
Textbox tab___
Menu bar___
Form designer___
Forms___
a. The period during which a program executes
b. GUI objects that provide an interface for collecting, displaying, and delivering information
c. Provides list a controls that can be dragged onto a Form so that you can develop programs visually
d. A keyword in a method header that dictates which classes can use the method
e. The area where you design applications visually
f. A Form property that gets or sets the button on the Form that is clicked when the user presses the enter key
g. A control that has this can receive keyboard input
h. Lies horizontally across the IDE window, and includes submenus that list additional options
i. An icon that appears beside a list or a section of code and that can be expanded or condensed
j. The event generated when a user clicks a control in a GUI program
Answer:
1.c 2.b 3.a
Explanation:
Wider channel bandwidth ________. increases transmission speed allows more channels to be used in a service band both increases transmission speed and allows more channels to be used in a service band neither increases transmission speed nor allows more channels to be used in a service band
Wider channel bandwidth decreases transmission speed.
What is Wider channel bandwidth?Wider WiFi channel widths is known to be a bandwidth that is made up of 40 MHz and 80 MHz width.
They are known to be used often in the 5 GHz frequency band. In this type pf band, there are said to have a lot of WiFi channels and also less overlapping channels and as such, Wider channel bandwidth decreases transmission speed.
Learn more about bandwidth from
https://brainly.com/question/4294318
Why laptop computer is called micro computer?
Answer:
A lot top is a microcomputer because Michael computer has all the devices that you can use
Whats the difference between pseudocode and python? please hurry!!! brainliest for fastest! :3 50 POINTS!!!
Answer:
Pseudocode is a more readable coding language that is used for repeating steps, however, is similar to python. It may exclude certain functions or details due to its level of readability, which has pros and cons.
Python, however, is a multi-purpose fun coding language that is, similar to HTML and Pseudocode, good for beginners. Python is simple and easy to learn. You can make games, store data, get user input, and much more.
Explain two methods which the operating system may use to maintain the security of data stored on disk
Answer:
Measures that can be taken to keep data secure include: making regular backups of files (backup copies should be stored in fireproof safes or in another building) protecting yourself against viruses by running anti-virus software. using a system of passwords so that access to data is restricted.
Explanation:
The methods that the operating system may use to maintain security are:
Regularly logging off or locking.
The use of data encryption methods to code data.
How do operating systems keeps security of data?In the areas of Security utilities, there is often the use of encryption to maintain data.
In this process, one can encrypt data as at the time it is been saved, or when one is trying to transmit it over a network. One can also use anti-virus software so as to check and blocks viruses.
Conclusively, the use of the methods above in the operating system may can help you to maintain security.
Learn more about operating system from
https://brainly.com/question/22811693
#SPJ2
Which of the following can be used to offer a higher impedance to all frequencies except the resonant frequency?
A. RL time constant circuit
B. Parallel LC circuit
C. RC time constant circuit
D. Series LC circuit
Answer:
D. Series LC circuit
Explanation:
Impedance changes monotonically with frequency for an RC or RL circuit. A parallel LC circuit has a maximum of impedance at resonance. Only the series LC circuit will have its lowest impedance at resonance, and a higher impedance elsewhere in the frequency spectrum.
Answer:
D. Series LC circuitExplanation:
can be used to offer a higher impedance to all frequencies except the resonant frequency.
what are the five generations of computer based on computing characteristics
What is the error in the following pseudocode?
// This program uses an array to display five names.
Constant Integer SIZE = 5
Declare String names[SIZE] = "Meg", "Jack", "Steve", "Bill", "Lisa"
Declare Integer index
For index = 0 To SIZE
Display names[index]
End For
Fill in the blank to complete the sentence.
If you only want to use the localtime function, you can load just that one function into active memory using the following line of code.
from _______ import localtime()
(Sorry for bad picture)
Answer:
The correct answer is time
Explanation:
from time import localtime()
What is the purpose of a register in a CPU? Describe three types of registers.
Answer:
I hope this answer is correct
Explanation:
Internal registers include the instruction register (IR), memory buffer register (MBR), memory data register (MDR), and memory address register (MAR). The instruction register fetches instructions from the program counter (PC) and holds each instruction as it is executed by the processor.
analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one example
Answer:
Explanation:
Multinational Companies tend to have millions of users from all over the globe who use their services and in doing so provide their information. This information gets saved on the databases of these companies. It is then up to the company on how they will use this information. This is where ethicality comes into play. A company can act ethically and protect the information that has been entrusted to them by their user, or they can act unethically and use the users' personal data to make profits. It has recently come to light that some companies have been using users' private data and would sell it to other companies for profit. These buying companies would then use the data for a variety of things such as ad targeting and statistics. These companies profited massively and the actual owners of the data did not, which makes this incredibly unethical.
Should spreadsheets be used to capture the results of a science experiment?
YES
NO
Answer:
Yes
Explanation:
Spreadsheets should be used to capture the results of science experiments because they are good for sorting data. They make results easier and information easier to see and use.
No.
Graphs are often an excellent way to display your results. In fact, most good science fair projects have at least one graph. For any type of graph: Generally, you should place your independent variable on the x-axis of your graph and the dependent variable on the y-axis.
How do the dp with backtrack methods differs from recursive backtracking?
Answer:
Dynamic programming is a method of solving complex problems by breaking them down into simpler steps. It is applicable to problems that exhibit the properties of 1) overlapping subproblems which are only slightly smaller and 2) optimal substructure.
Backtracking is a general algorithm for finding all (or some) solutions to some computational problem, that incrementally builds candidates to the solutions, and abandons each partial candidate c ("backtracks") as soon as it determines that c cannot possibly be completed to a valid solution.
Should spreadsheets be used to keep score of a baseball game?
YES
NO
Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function Even to find the total number of even elements in the array.
It should have input parameter array arrayIntValues.
A[length][width]
Length
Width
The function should return an integer. Also create a C++ subroutine called printArray with the input parameter array.
Answer:
Here is the C++ program:
#include <iostream> //to use input output functions
using namespace std; // to identify objects like cin cout
const int MAX_ROWS=3; //sets the maximum number of rows to 3
const int MAX_COLUMNS=2; //sets the maximum number of columns to 2
//function prototypes
void printArray(const int array[MAX_ROWS][MAX_COLUMNS]);
void Even(const int arrayIntValues[MAX_ROWS][MAX_COLUMNS]);
int main(){ //start of main method
int arrayIntValues[MAX_ROWS][MAX_COLUMNS]; //declares a 2D array of integers
cout<<"Enter elements of 2D array: "; //prompts user to enter integers in a 2D array
for(int i=0;i<MAX_ROWS;i++) { //outer loop to iterate through rows
for(int j=0;j<MAX_COLUMNS;j++) //inner loop to iterate through columns
cin>>arrayIntValues[i][j]; } //reads and stores integers in 2D array
Even(arrayIntValues); //calls Even method by passing arrayIntValues
printArray(arrayIntValues); } //calls printArray method by passing arrayIntValues
void Even(const int arrayIntValues[MAX_ROWS][MAX_COLUMNS]){ //method that takes an array as parameter and finds the total number of even elements in the array
int count = 0; //counts the number of even numbers in array
for(int row=0;row<MAX_ROWS;row++){ //outer loop iterates through rows of the array
for(int col=0;col<MAX_COLUMNS;col++){ //inner loop iterates through columns of the array
if(arrayIntValues[row][col]%2==0 && arrayIntValues[row][col]>=0) //if the element at specified index of 2D array is an even number i.e. completely divisible by 2 and that element is positive
count++; } } //adds 1 to the count variable each time an even positive integer appears in the array
cout<<"total number of even elements in the array: "<<count<<endl; } //displays the number of even element in arrayIntValues
void printArray(const int array[MAX_ROWS][MAX_COLUMNS]){ //method that takes an array as parameter and displays the even numbers in that array
for(int row=0;row<MAX_ROWS;row++){ //outer loop iterates through rows of the array
for(int col=0;col<MAX_COLUMNS;col++){ //inner loop iterates through columns of the array
if(array[row][col]%2==0 && array[row][col]>=0) //if the element at specified index of 2D array is an even number i.e. completely divisible by 2 and that element is positive
cout<<array[row][col]<<endl; //displays the even element of the array
else //if element is not even
continue; } } } //continues the loop to look for even elements
Explanation:
The program first prompts the user to enter elements in 2D array. It then calls Even method which iterates through the rows and columns of the array to look for the positive even numbers (elements) in array . Whenever a positive even number is encountered in the array, the count variable is incremented to 1. At the end the method returns an integer which is the total number of even elements in the array. Then the program calls printArray method which iterates through the rows and columns of the array to look for the positive even numbers (elements) in array . Whenever a positive even number is encountered in the array, that element is displayed on the output screen. The screenshot of the output is attached.
The while loop is also known as what kind of a loop? entry-control loop operational loop infinite loop user-control loop
Do you think having a common platform (e.g. operating systems, hardware types, cloud devices, etc.) for your servers makes it easier to secure, or does having a limited number of platform provide a larger target for hackers
Answer:
yes i think so
Explanation:
it makes it easily accessible