Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past, she has asked her friends to suggest any preventive measures that she can take to avoid hardware failures. Which of the following suggestions should her friends give her?

Answers

Answer 1
Hello, I am charlespierce576! I believe I might have the answer! Simple policies such as turning of off devices not in use. Also unplugging devices during a storm.

Related Questions

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Answers

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

A metaphor of human-computer interaction (HCI) in which interacting with the computer, is much like carrying on a conversation is called a _______ metaphor.

Answers

The answer is
Dialog metaphor.

Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a very complex problem as there are many things to consider. How will you decompose this problem?

Answers

Explanation:

On October 31, around twelve o'clock at night, the lights were dull. It was Siberian cold and I was walking painfully under the whitish lighting of a lamppost and the retro neon lights of a convenience store in a neighborhood that was buzzing when I went to buy meat. buildings, grayish in this half-light, crumbled under the weight of sleep, while the neighborhood was still open. Its decoration was particularly macabre in tone: synthetic but very sticky spider webs adorned the porches of the terraces, pumpkin ornaments are exhibited like works of art, ... Some pushed the macabre by hanging mannequins made up in corpses. At the entrance to the neighborhood, I found the body of its owner stabbed. Frozen in place, I wondered what else awaits me. My heart was pounding, feeling a shiver of anguish. When I was removing the phone from my pocket to call my police friends, my hands were clenched in fear. An investigation was carried out to find out the causes of death. Also, I went with them so they take my words. Hopefully the murderer will be arrested to put an end to this sybilinous crime.

What can you do to help create a safe online environment?

Answers

Answer:

by not adding a scam proof app

Explanation:

because thats life

Be mature, be careful with who you have on social media and watch for scams

A ____________ is malware that copies itself repeatedly, using up system resources and slowing a system or device until it hangs and no longer functions.

Answers

Answer:

worm

Explanation:

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

Write an algorithm that outlines how to calculate the room area for the image below.

Answers

Answer:

The following are the algorithm to this question:

Explanation:

Following are the steps of the algorithm:

step 1:

To calculate the area of the room, firstly we need to divide the given image into parts and calculate the area of the given image.

step 2:

After calculating each part area, we merge all the parts to calculate the areas.

Calculating area of the parts:

In part 1:

It forms the square shape, and the formula of the square is [tex]side \times side[/tex].   In this diagram we let A=B. that's why the area is [tex]b^2[/tex].

In part 2:

In this part also forms the square image.  In this, the side is equal to (A-c). so, the area is equal to [tex](A-C)^2[/tex].

In part 3:

It forms the triangle shape, and the area of the triangle is[tex]= \frac{b \times h}{2}[/tex]. the value of "b" is E and the "h" is = (A-C). so, the area is [tex]= \frac{E\times (A-C)}{2}[/tex].  

The total area is:

[tex]\bold{ =b^2+(A-C)^2+ \frac{E\times (A-C)}{2}}[/tex]

The algorithm that outlines how to calculate the room area is as follows:

StartInput A, B, C, D, EAreaRectangle1 = A x BAreaRectangle2 = (A - C) x (D - C - E)AreaTriangle1 = 0.5 x E x (A -C)Total = AreaRectangle1 + AreaRectangle2 + AreaTriangle1Print TotalStop

From the attached figure, we can see that the figure has been split to 3

A rectangle with the dimension; A by BA rectangle with the dimension: (A - C) by (D - C - E)A triangle with the dimension base E and height (A - C).

So, the algorithm is as follows:

Start ---- > This begins the algorithmInput A, B, C, D, E ---- > This gets input for the sides of the shapeAreaRectangle1 = A x B ----> This calculates the area of the first rectangleAreaRectangle2 = (A - C) x (D - C - E) ----> This calculates the area of the second rectangleAreaTriangle1 = 0.5 x E x (A -C) ---> This calculates the area of the triangleTotal = AreaRectangle1 + AreaRectangle2 + AreaTriangle1 -----> This adds up the 3 areas to get the total area of the shapePrint Total ----> This prints the calculated areaStop -----> This ends the algorithm

Read more about algorithms at:

https://brainly.com/question/17780739

QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Manager

Answers

Answer: Task manager

Explanation: The task manager window represents an interface in personal computers manufactures by Microsoft. The task manager window contains several information about a computers current processes usually displayed in graphical manner, in addition it provides information on the current running processes and application, the uptime of the computer, the graphic processor. With the task manager window users can set process priorities and prioritize applications, by affording users to view process and their corresponding load on the CPU, users can terminate or close applications from within the task manager interface. Hence non-responsuve programs can be viewed and terminated.

Context-based signatures match a pattern of activity based on the other activity around it, such as a port scan. true and false

Answers

Answer:

The given statement is "True".

Explanation:

Context-based signatures become wired networks on either the incoming packet's information. Documentation included within the IP headers has been used to stimulate a certificate or stamp based on the scenario. The whole category of signatures examines congestion and how much it appears to fit through the other pedestrians which mostly surrounds it.

So that the above is the true answer.

INTRODUCTION TO JAVA​

Answers

Answer:

INTRODUCTION TO JAVA​

Explanation:

Java is one of the most popular programming languages out there. Released in 1995 and still widely used today, Java has many applications, including software development, mobile applications, and large systems development. Knowing Java opens a lot of possibilities for you as a developer.

Answer:

INTRODUCTION TO JAVA​

Explanation:

Java is one of the most popular programming languages out there. Released in 1995 and still widely used today, Java has many applications, including software development, mobile applications, and large systems development. Knowing Java opens a lot of possibilities for you as a developer.

Which argument forces a writer to return to and change the input before resolving a “UnicodeError”?

errors= “strict”
errors= “fix”
errors= “ignore”
errors= “replace”

Answers

errors= “fix” argument forces a writer to return to and change the input before resolving a “UnicodeError”.

What is Unicode Error?

Python uses the Unicode standard to represent characters in code point format. These standards were created to prevent character ambiguity, which could lead to Unicode problems.

To eliminate such uncertainty, we employ Unicode standards. It is also possible to consider the capital "i" as two distinct characters with two separate meanings.

Python supports two different forms of Unicode errors: Unicode encodes errors and Unicode decodes errors. It incorporates the idea of Unicode error handlers in Python.

Therefore, errors= “fix” argument forces a writer to return to and change the input before resolving a “UnicodeError”.

To learn more about Unicode, refer to the link:

https://brainly.com/question/17147612

#SPJ3

Which function key opens a dialog box that allows you to make a special selection of, for example, all cells containing comments, or all cells containing formulas, or all objects (text boxes, shapes, etc.) on a worksheet

Answers

Answer:

F5 key.

Explanation:

In Computer science, F5 is a function key which opens a dialog box that allows you to make a special selection of, for example, all cells containing comments, or all cells containing formulas, or all objects (text boxes, shapes, etc.) on an excel worksheet.

In Microsoft Excel, the F5 key is known as a "Go to special function" which avails users the ability to select all cells that meets certain defined criteria, such as the cells containing comments, formulas, objects, constants etc.

Given the following piece of code: class Student { public void talk(){} } public class Test{ public static void main(String args[]){ Student t = null; try { t.talk(); } catch(NullPointerException e){ System.out.print("There is a NullPointerException. "); } catch(Exception e){ System.out.print("There is an Exception. "); } System.out.print("Everything ran fine. "); } } what will be the result?

Answers

Answer:

In the output of the given piece of code, the following lines are printed on the output screen:

There is a NullPointerException. Everything ran fine.    

Explanation:

In the given code

class Student {

   public void talk(){} }

This is a Student class which has a function talk()

The following is the Test class

public class Test{

   public static void main(String args[])

   { Student t = null; try { t.talk(); }

   catch(NullPointerException e)

   { System.out.print("There is a NullPointerException. ");        

   } catch(Exception e)

   { System.out.print("There is an Exception. "); }

   System.out.print("Everything ran fine. "); } }

The above chunk of code creates a Student class object named t which is set to null. A null value is assigned to "t" to indicate that it points to nothing.

In the program a method talk() is called on a null reference. This results in NullPointerException. This is a run time exception. Since no object is created so compiler will not identify this error and this error comes in run time.

The try statement defines a code chunk that is to be tested in case of errors when the code chunk is execute. This is basically used for exception or error handling. The catch statement defines a code chunk (one or two lines of code) that executes if an error occurs in try part (block of code).

Sometimes it is needed to create a reference of the object even before creating an object and this has to be initialized or assigned a value. So null is assigned to such an object reference.

If the talk() method is intended to do something to the object t, which points to nothing, then try throws NullPointerException to indicate this error.

Since the program attempts to use an object reference that contains a null value , so when the program is executed, the try part throws NullPointerException and catch part is executed to indicate this exception. The catch part that executes contains the following statement:

   { System.out.print("There is a NullPointerException. ");

So this message is printed at output screen followed by this statement  System.out.print("Everything ran fine. "); } } message. The second catch will not execute as there is no other error in the program except for the NullPointerException. So the output is:

There is a NullPointerException. Everything ran fine.  

What part of the network is the point where the responsibility of the administrator ends and the telecommunications providers responsibility begins

Answers

Answer:

"PAD interface " is the correct answer.

Explanation:

PAD seems to be a concept most commonly linked with such an X.25 interface, where even the PAD splits the shared information into individual packets as well as configurations asynchronous distribution including its header information.The interface pad should be used for scrubbing polished surface areas and contour lines, in conjunction with handle abrasive particles. Use the pad GUI would also give a smoother performance. The control pad is located between some of the scrubbing disc as well as the backing pad.

What are pixels that are the exact same between multiple frames called?

Answers

Answer:

the answer is temporal redundancy

Explanation:

Computer Definition. Pixels in two video frames that have the same values in the same location. Exploiting temporal redundancy is one of the primary techniques in video compression (see interframe coding). Contrast with spatial redundancy.

Pixels that are the exact same between multiple frames are called: temporal redundancy.

A digital image can be defined as a type of image that comprises a matrix of pixels and is typically stored in binary form.

In digital imaging, pixel can be defined as the smallest (minute) are of illumination on an output device through which an image is  formed. Thus, a pixel is a small or minute dot that a digital image is composed of.

A frame can be defined illustration or presentation of all of the multiple visual elements in an image.

A temporal redundancy is also referred to as exploiting interframe coding and it can be defined as pixels that are the exact same between multiple frames.

For instance, when there are pixels in two (2) frames that are having exactly the same values in the same location, this is usually described as temporal redundancy.

Read more: https://brainly.com/question/12972964

What is the full form of" MIPS"​

Answers

Million instructions per second

Answer:Microprocessor without Interlocked Pipelined Stages

Explanation:It was first introduce to united states.

epic poem - long narrative poem about heroic deeds about pharrell williams of the happy song please help i need the right answer

Answers

"Happy" is a song written, produced, and performed by American singer Pharrell Williams, released as the first and only single from the soundtrack album for the film Despicable Me 2 (2013). The song was first released on November 21, 2013, alongside a long-form music video. The song was reissued on December 16, 2013, by Back Lot Music under exclusive license to Columbia Records, a division of Sony Music.[1] The song also served as the lead single from Williams' second studio album, Girl (2014).

"Happy" is an uptempo soul and neo soul song on which Williams's falsetto voice has been compared to Curtis Mayfield by critics. The song has been highly successful, peaking at No. 1 in the United States, United Kingdom, Canada, Ireland, New Zealand, and 19 other countries. It was the best-selling song of 2014 in the United States with 6.45 million copies sold for the year,[3] as well as in the United Kingdom with 1.5 million copies sold for the year.[4] It reached No. 1 in the UK on a record-setting three separate occasions and became the most downloaded song of all time in the UK in September 2014;[5] it is the eighth highest-selling single of all time in the country.[6] It was nominated for an Academy Award for Best Original Song. A live rendition of the song won the Grammy Award for Best Pop Solo Performance at the 57th Annual Grammy Awards.

The music video for "Happy" was nominated for Best Male Video and Video of the Year at the 2014 MTV Video Music Awards. It also won the Grammy Award for Best Music Video at the 57th Annual Grammy Awards.[7][8] The song was Billboard's number-one single for 2014.

"Happy" was the most successful song of 2014, with 13.9 million units (sales plus equivalent streams) worldwide

The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's CBK.

Answers

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

Answer:

CISSP

Explanation:

A key principle of human-computer interaction (HCI), that states that the appearance of any control should suggest its functionality, is called

Answers

Answer:

"Affordance" is the correct answer.

Explanation:

The performance or properties of such an entity that determines its possible applications which makes it abundantly clear how everything could and should always be used people are sitting or standing on something like a chair as it is very apparent.Users are allowed to experience conceptions without thinking about how to make use of other objects.

Which of the following is something you might ask yourself to determine if an
action you are considering is ethical?
O A. Is this the easiest option?
O B. Can I stand by this action?
O C. Will this action benefit me?
O D. Will I get away with it?

Answers

Answer:

B

Explanation:

I honestly am not "shore" but tried lol

The option that is something you might ask yourself to determine if an action you are considering is ethical is "Can I stand by this action?"

What question do you need to ask yourself in an unethical situation?

Most times, when in a situation that demands the use of ethics, we do ask ourselves if  our actions legal.

Conclusively, The option that is something you might ask yourself to determine if an action you are considering is ethical is "Can I stand by this action?" When we ask ourselves that, we can be able to know if we should be involve in that thing or not.

Learn more about ethical actions from

https://brainly.com/question/13969108

#SPJ2

You have just replaced the ink cartridge in an inkjet printer. What should you do immediately after this?

Answers

calibrate the printer

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

Write a program to find the profit, if the selling price of speaker is 5000, and cost price is 4000

Answers

Answer:

25%

Explanation:

original price

4000. - 100%

selling price

5000. - x%

multiply 100 with 5000 then divide by 4000.

the answer should be 125. Now subtract 125 and 100 to find the profit percentage.

When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive solution to this problem?

Answers

Answer: You could look up tutorials on how to fix it your self or take it somewhere to get it fixed for cheap.

Explanation:

Answer:

Update the motherboard drivers.

Explanation:

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
questions.
Online Content: Site 1
What was one important academic skill the blogger learned?
9) XO3-
BIUS X, x®

Answers

Answer:

It says in the article.

Explanation:

"Taking tests was really hard for me. I would get really nervous before tests. Mr. Davidson, my math teacher, taught me that if I prepared well, there was no reason for me to feel anxious over tests. He showed me how reviewing my notes every night would help me remember what was taught in class. This daily review reduced the amount of time I had to spend preparing for big tests. "

Answer:

 One important academic skill the blogger learned . I struggled in my first year. Many times I failed assignments because I missed due dates, and I did poorly on quizzes and tests because I could not understand my own notes. I was frustrated and about to give up, but then I met Mr. Lee. He sat me down and asked me to describe how I did homework. He quickly identified the issue: I was not organized. He told me to write down every assignment, big or small, on a calendar. He also showed me how to make to-do lists and organize my notes. Every afternoon, he would look at my notes and suggest how to improve my note-taking skills. Not long after that, my grades started improving.

Explanation:

I got it correct on edg

The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

Answers

Answer:

Digital Signature Standard (DSS)

Explanation:

The term that is being described is known as Digital Signature Standard (DSS). This term is mainly used in the context of cryptography and was created by the Federal Information Processing Standard(FIPS) in order to define algorithms that are used to generate digital signatures using a specifically designed Secure Hash Algorithm(SHA) to authenticate electronic documents.

Tawni made some changes to her file and wants to save the changes in a document with a different title. How can she do this?

Answers

Answer:

By using the save as tab

Explanation:

The save as option allows a user to make another different copy of the same document, or to save the document in another location within the computer system. The shortcut key to quickly access the save as option, is F12. The save as option can also be accessed by going through the following steps

1) Click the File tab

2) Click on the Save as option

3) Select a location to save the file then click save to confirm selection and save the file.

Answer:save as tab

Explanation:

Your hometown probably has little to offer in terms of photography because you've already seen it. True False

Answers

False it the answer bro

Answer:

Your answer would be (B) False

Explanation:

I hope this helps

The volume of a cylinder is equal to the height times the area of the circular base. The area of the circular base is equal to π(pi) times the square of the radius.

The code segment below is intended to compute and print the volume of a cylinder with radius r and height h. Assume that the double variables r, h, and pi have been properly declared and initialized.

/* missing code */

System.out.print(volume);

Which of the following can be used to replace /* missing code */ so that the code segment works as intended?

I. double baseArea = pi * r * r;double volume = baseArea * h;
II. double volume = pi * r * r;volume = volume * h;
III. double volume = pi * r * r * h;

a. I only
b. III only
c. I and III only
d. II and III only
e. I, II, and III

Answers

Answer:

The answer is "Option e".

Explanation:

In this question we calculating the  volume of a cylinder, that's formula is:

[tex]\boxed{\text{Volume}= \pi \times r^2 \times h}[/tex]

In the above, we use π that's value is 3.14 or [tex]\frac{22}{7}[/tex] and "r and h" is input by the user. In the given choices all were correct it calculates the volume, that can be defined as follows:

In choice 1, The double variable "baseArea" is declared, which first calculates [tex]\pi \cdot r^2[/tex] value then multiply the h value and store it into the "volume" variable.In choice 2, The double variable "volume" is declared, which first calculates [tex]\pi \cdot r^2[/tex] value then multiply the h value and store it into the "volume" variable. In choice 2, The double variable "volume" is declared, which directly calculates the volume value by the above-given formula.

how do u get rid of this (the grey box)

Answers

Answer:

can't helpnyounddjdjzjzjsjejs jvm d

Press on the highlight color and put none

Christine has a motherboard with a Socket 1156 and has called you to see if a Socket 1150 CPU could be used in its place. What would you recommend that she do?

Answers

Answer:

Hi. A tech-savvy here, the answer to the question is '' I would recommend Christine to purchase a new motherboard that has an 1150 socket in it. ''

Cheers,

Other Questions
An existing customer of a brokerage firm wishes to buy an initial public offering that he has heard good things about. The registered representative only has a limited number of shares to sell and explains to the customer that the offering is already "sold out." The customer tells the registered representative "If you can get me some of the stock, I will drop off cash payment in full today, with a little extra for you." The registered representative:_________a. Can accept the customers offerb. Cannot accept the customers offer because cash payment for securities purchases cannot be excepted from a customerc. Can except the customers offer if the extra cash payment does not exceed $500d. Cannot except the customers office A client diagnose with scabies has been prescribed lindane lotion. What is the recommended method of administration of this medicated lotion In 1845, the immediate cause of war with Mexico was Group of answer choices a dispute over territory. a dispute over tariffs. Mexicos debt to the United States. the issue of slavery. the Alamo. Juan is interested in getting a job in the technological field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for? which statement best describes how the pipe player in passage one influenced Caesar's crossing of the Rubicon? I WILL GIVE BRAINLIEST The grade point averages for 10 randomly selected students in an algebra class with 125 students are listed below. What is the effect on the width of the confidence interval if the sample size is increased to 20? b. Write down the major functions of blood circulatory system. What is LVN Corporation's direct labor efficiency variance? (Round any intermediary calculations to the nearest cent and your final answer to the nearest dollar.) A family lives in a large tower apartment building, 10 floors high. Every day their son takes the elevator from the familys apartment on the 10th floor to the ground floor and goes to school. When he returns in the afternoon, he uses the elevator to get to the fifth floor, and then uses the stairs for the remaining five floors. Why? A reflexive verb is a A physical pendulum in the form of a planar object moves in simple harmonic motion with a frequency f. The pendulum has a mass m, and the pivot is located a distance d from the center of mass. Determine the moment of inertia of the pendulum about the pivot point Which type of scientific model would be best for showing how our climate may change over the next fifty years? 1. Mathematical model2. conceptual model 3. Physical model What was President Hoover's initial policy on the Great Depression? A. He established the Three Rs to help end the Depression. B. He established the New Deal to help end the Depression. C. He felt the government should not get directly involved. D. He felt the government should get involved. A bricklayer is building a wall. Each layer of the wall has the same number of bricks. The points on the following coordinate plane show how many bricks he used to make 2, 3, and 4 layers of the wall. If 4x 3 = 2x + 9, then x = ? Fill in the blanks.1._______ live on the blood or tissue of other organisms.2. The type of teeth seen in _______ are usually broad and flat.3. Some animals have specialized cells that absorb food, break it down internally, and pass thenutrients to other cells in a process called _____4. _____ have some tissues such as cell walls, which require special structures like rumen tobreak down in the digestive system.5. Gas exchange involves the absorption of _____ into the bloodstream and the release of CO2waste6. Aquatic animals have specialized structures called ______ that allow for oxygen to beabsorbed into the bloodstream directly from water as it passes through.7. Insects typically have ______ circulatory systems.8. Ammonia must be converted into urea in the_______ to be excreted later in mammals as urine. In droplet precautions a person is considered infectious for a distance of Explain the strategy used by Sargon to conquer the Sumerian city-states. Why was this strategy successful? what is an example of expository writing? Identify the sentence that contains a compound verb. A. Both Carol and John love to ski all winter long. B. Yesterday I wanted to visit the new bookstore in town, but they were closed. C. Mom decided to clean the house and shampoo all of the rugs. D. Whenever my sister and I visit our cousin, we have such a good time!