Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner?
The corrective action(s) that you need to perform on a computer in case it functions in an unexpected manner is called

Answers

Answer 1

Answer:

Reboot?

Explanation:

Hard to tell from the information provided.


Related Questions

Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study
environment?
O phones
O clutter
O noise
O laptops

Answers

Answer:

B. Clutter

Explanation:

I just looked it up on quizlet and quizlet is always right. Helps me on test and everything. But it distracts you unlike phone and laptop because you can not ignore clutter like you can with other things, because clutter makes you confused and wonder what is going on.

Which of the following are characteristics of the Boolean data type? Check all that apply
It holds infinite values.
It uses operators such as AND, OR, and NOT
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Help I’m timed !!

Answers

Answer:

It uses operators such as AND, OR, and NOT.

It holds a TRUE or FALSE value.

It is named after a nineteenth-century mathematician and logician

Explanation: Just did it on edg

Answer:

It uses operators such as AND, OR, and NOT.

It holds a TRUE or FALSE value.

It is named after a nineteenth-century mathematician and logician

Explanation:

Got it correct on edge

What is the purpose of the Chart feature in Word?
O A chart can be used to draw and format a Word table.
O A chart can be used to paste information from a graph.
O Information can be typed into a chart to create a graph.
O Information can be typed into a chart to insert a Word table.

Answers

Answer:

Its the third option.

Explanation:

Answer: its c Information can be typed into a chart to create a graph

Explanation:

What is it called when you want to see database records in a certain order?

Answers

It’ll be a data sheet view

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.
A.True
B. False

Answers

Answer:

a. true

Explanation:

IP is a unreliable protocol because it does not guarantee the delivery of a datagram to its destination. The reliability must be provided by the upper layer protocols like TCP. IP does not support flow control, retransmission, acknowledgement and error recovery.

Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about the use of cyberterrorists?

Answers

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

the font size sets the size of text​

Answers

Answer:

Yup thats correct

Explanation:

Which are types of online resources that students can use for help? Check all that apply. simulated labs web-based educational games educators classmates discussion forums

Answers

Answer:

Simulated Labs

Web-Based Educational Games

Discussion Forums

Explanation:

Did a test with the same question.

Online resources that students can use for help are simulated labs, web-based educational games, and discussion forums.

What are online sources in education?

Online sources in education refer to any resource available on the Internet in an internet instructional environment.

It is probably HTML files including course or chapter objectives, lecture notes, assignments, and many more. These are probably audio or video lessons, interactive exercises or exams, or files that provide hyperlinks to different websites.

Hence, Online resources that students can use for help are simulated labs, web-based educational games, and discussion forums.

Learn more about online sources in education here:

https://brainly.com/question/14591988

#SPJ2

What is one thing the ADDIE model does NOT account for?
O An investigation of the problem and audience
O The need for end users to receive training in the use of the product
O The existence of various types of media that could be used to deliver the content
O New discoveries and needs that come up in the process of the design step

Answers

Answer:

O An investigation of the problem and audience

Explanation:

ADDIE stands for Analysis, Design, Development, Implementation, and Evaluation which is defined as an instructional systems design framework that helps to develop training courses.

The main idea behind the development of ADDIE was to provide a good learning experience through structured training methods. But there was a limitation of ADDIE that is, it is not able to recognise or investigate the problems and unable to solve the issues.

Hence, the correct option is "An investigation of the problem and audience".

Answer:

It should be the last option

Explanation:

what is Doppler shift

Answers

Answer:

When a body that is emitting radiation has a non-zero radial velocity relative to an observer, the wavelength of the emission will be shortened or lengthened, depending upon whether the body is moving towards or away from an observer. This change in observed wavelength, or frequency, is known as the Doppler shift.

What is the act of working with someone to produce or create something?

A. Collaboration
B. Decision-making
C. Non-verbal communication
D. Problem solving

Answers

Answer:

A

Explanation:

Answer: A

Explanation:

How to sync songs from desktop to mobile device spotify.

Answers

Answer:

The answer is below

Explanation:

In order to sync songs from desktop to mobile device Spotify. This following must be followed:

1. From the Spotify PC app, add Local Files in toe synchronized ed to a phone list.

2. Ensure to log into Spotify on mobile phone on the same WiFi network as PC.

3. Click on the menu button

4. Click on Music.

5. Click on Playlists and access folder with local music files

6. Click on the Available Offline switch at the top.

7. A green arrow is shown to depict successful synchronization.

Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contains technical language. It is reviewed by competitors.

Answers

Answer:

It is based on research

Explanation:

An effective problem statement is a term often used in research operation to describe a statement that practically deals with the current issue that needs to be solved, situations or circumstances that require enhancement, or a drawback that must be solved, which demands critical insight and conscious analysis.

There are various characteristics of Effective problem statement, some of which are:

1. It should focus on the need for solving the problem

2. The ways in which the problem will be solved should be stated in a precise and concise manner

3. It should be based on the main objective of the statement.

Hence, in this case, the correct answer is "It is based on research."

Answer:

A

Explanation:

Correct on Edge 2021:)

Your welcome

Which of these graphic elements combine text, illustrations, and color? Word Art Smart Art Clip Art none of the above

Answers

Answer:

I believe it's Word Art

Explanation:

10) What are some advantages of being able to see an image right after
you've taken it (such as with an instant camera or being able to reven the
image on a digital camera)?

Answers

If you get to see the image right after you take it you can tell if it’s worth it to take more photos or decide if you’re happy with the photo you just took.

Which of the following is a tool HR managers can use to improve commincations between workers of different generations in the same workplace? A)recruitment pools B)l-9 forms C) mentoring programs D)work/life balance

Answers

Answer:

Mentor Programs

Explanation:

This is because it is talking about different ages which is a mentor type thing

Answer: mentoring programs

Explanation:

A p e x

Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it appear to come from another employee's account. Be sure to include some SMTP commands the culprit might have used.

Answers

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

Which is true regarding diagramming? It involves writing an algorithm. It presents the programming code. It shows the flow of information and processes to solve the problem. It models solutions for large problems only.

Answers

Answer:

It shows the flow of information and processes to solve the problem.

Explanation:

Answer:

C

Explanation:

Got it right on Edge 2021:)

Your welcome

Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
O add a title to a chart
o change the way a chart looks
change the position of the chart
add a chart to a Word document
change the type of an existing chart

Answers

Answer:

add a title to a chart

change the way a chart looks

change the type of existing chart

Explanation:

i just took it ! remember to stream fine line by harry styles, walls by louis tomlinson , hs1 by harry styles, lp1 by liam payne, mind of mine by zayn , icarus falls by zayn , flicker by niall horan, heartbreak weather by niall horan, up all night by one direction, take me home by one direction, midnight memories by one direction, four by one direction , and made in the am by one direction . :)

Answer:

add a title to a chart

change the way a chart looks

change the type of existing chart

Explanation:

took it on edu 100%

What does "Forward" in emails do?​

Answers

Basically just want to make your your email is easy

When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What similar result happens to the value of a binary number when you add a zero on the right? (For example, "11" would become "110").

Answers

Putting a 0 on the right side of a binary number it multiplies it by 2.

Hope this helps ʕ•ᴥ•ʔ

When you you add zero to the right hand side of a binary number such as 11, This binary number is going to become twice its value.

All the number that were 1 are now two times of what they were. We would have a solution like this:

(11)₂ = (1x2)¹ + (1x2)⁰

= 2 + 1

= 3

(110)₂ = (1x2)² + (1x2)¹ + (0x2)⁰

= 1x4 + 1x2 + 0x1

= 4+2+0

= 6

In conclusion, adding 0 to the right hand side of a binary number increases the number by 2. From  the solution above, we can see 11 = 3, but after 0 was added, 110 = 6

Read more at https://brainly.com/question/14789125?referrer=searchResults

What products can be benefited from cyber security?

Answers

Computers. It protects the system from viruses worms and spyware

Pleaseee answer number 9 I’m having trouble ❤️

Answers

Answer:

I think it is C but sorry if it wrong

Answer: A

Explination:

what tool should you use to look for information on a network?
A. A social network
B. A magnifying glass
C. A search engine
D. A consumer report

Answers

The answer is C. a search engine

For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
products that a popular baking company donated to him for the school fair. Danica tells George that he can access
the symbol using keystroke codes.
Which keystroke code does George need to use to add the registered symbol beside the company's name?
O Alt + 0174
O Ctrl + 0174
* Enter + 0174
O Windows + 0174
Intro
Done

Answers

Answer alt +0174

Explanation:

Answer:a

Explanation:

Write the name of the tab, the command group, and the icon that you need to use to justify
text in a Word document.
Tab:
Command group:
Icon:

Answers

Answer:

Tab: Home Tab

Command Group: Paragraph

Icon: Justify Icon

The icon has no name; rather it is represented by 4 horizontal lines that are aligned on both edges

Explanation:

To answer this question, I'll make use of the following attachment

Where

1- represents the home tab

2 - represents the paragraph

3 - represents the justify icon

Answer:

Tab: Home Tab

Command Group: Paragraph

Icon: Justify Icon

Explanation:

(minimum 4 sentences) What is cyber security and why is it important

Answers

Answer:

A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have  cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.

Explanation:

What are some cowboy ethics??

Answers

Answer:

giv meh a min plsssss

Explanation:

What should you remember about typography while creating your résumé?
It is advisable to avoid using [blank] font when creating your résumé. To facilitate readability, your font should not be smaller than [blank]
points.

Answers

Answer:

Your font should not be smaller than 0.5

Explanation:

You have been using an app on your mobile device for a 30-day trial period. Now that the 30 days have expired, the app is requesting that you to pay to continue accessing your data. What are your next steps? What steps could you have taken to preserve your data before the trial period expired?

Answers

Answer: Is there anyone choices A,B,C or D?

IF theres not. the answer is you could have canceled your trial early. Screenshots

not much i can help without choices

Other Questions
Find the x and y intercepts of the graph of the function Purple Dog Pet Supply Inc. (PDPS) released its annual results and financial statements. Eleanor is reading the summary in the business pages of todays paper. In its annual report this year PDPS reported a net income of $180,000. Last year, the company reported a retained earnings balance of $510,000, whereas this year it increased to $600,000. How much was paid out in dividends this year? By the late neolithic period, some groups started to have more power and resources than others. Below is a list of events that shows one way a family might have gained more power by the end of the Neolithic Period. Place the events in order. A reader of the article suggested that the author included the section "Controversy: Militants and founders" inorder to explain the controversial origins of Labor Day.Is this accurate? Which line from the article supports your answer?A. No Socialist unions supported a day of demonstrations, street protests and even violence.B. No: There is also a dispute over who suggested the idea of Labor Day, though this will likely never be known.C. Yes; in the U.S. it was picnics, rather than street protests, that won the day in the endiD. Yes. The earliest history from the mid-1930s credits Peter). McGuire, who founded the New York City Brotherhood of Carpentersand Joiners, a unionGotta (SubmitSaved at 5pm) 9/10/2020 PLZ HELP WILL GIVE BRAINLIEST Identify the property of real numbers illustrated in the following equation.6x + (-6x) = 0 Josh determined the solution set to the following inequality. His work is shown below.|36 4p| > 161.(36 4p) > 16, (36 4p) > 162.4p > 20p > 53.36 + 4p > 164p > 52p > 134.p > 5 or p > 13Analyze Joshs work. Is he correct? If not, what was his mistake?Yes, he is correct.No. In step 1 his second inequality is not correct.No. When solving the first inequality in step 2, he did not flip the inequality sign when he divided by a negative.No. When solving the second inequality in step 3, he did not flip the inequality sign when dividing by a positive. In a sample fruit basket, there are 2 apples for every 3 oranges.To make a large fruit basket with the same ratio using 20 apples, how many oranges are needed?Help me please?! 7. Chantel Monroe charges $3.75 per page for typing rough drafts and anadditional $0.50 per page for changes and deletions. A manuscript had212 pages, of which 147 pages had changes and deletions. What wasthe total cost of typing the manustript? Can someone please help me understand the Pythagorean theorem? I am having a hard time with it CRead the excerpt from "The Crab That Played with theSea."Which details from the excerpt best support theconclusion that the narrator is speaking directly to achild? Select two options.AbgHe went North, Best Beloved, and he found All-the-Elephant-there-was digging with his tusks andstamping with his feet in the nice new clean earth thathad been made ready for him.the expression "Best Beloved"the terms "kun" and "payah kun""Kun?' said All-the-Elephant-there-was, meaning, 'lsthis right?the repetition of words and patternsthe clause "you can look them out on the map"the description of how geographical features weremade'Payah kun,' said the Eldest Magician, meaning, 'Thatis quite right'; and he breathed upon the great rocksand lumps of earth that All-the-Elephant-there-was hadthrown up, and they became the great HimalayanMountains, and you can look them out on the map.He went East, and he found All-the-Cow-there-wasfeeding in the field that had been made ready for her,and she licked her tongue round a whole forest at atime, and swallowed it and sat down to chew her cud.Mark this and returnSave and ExitNextSubmit 2. If you notice a strange smell in your house, what should you be most alert for?A gas leakA mold colonyAn electrical shortThere's no need for concern why was the Code of Laws carved into a large stone slab where everyone could see it Which term describes the tendency of an object to resist changes in motion?A) reactionB) forceC) inertiaD) acceleration Alina was called up to the front of her anatomy class and was asked to stand in the anatomical position. She wasstanding with her head facing forward, her legs slightly apart, her arms to her sides, and her palms facing herbackside. How should she adjust her stance to be in the anatomical position?Help help help!!! WILL MARK FIRST ANSWER AS BRAINLIESTWrite an equation for the following (put the EQUATION in the answer box):Jamie spends the same amount of money each morning. On Sunday, he bought a newspaper for $1.25 and bought 2 donuts. On Monday, he spent $0.50 on a newspaper and also bought 5 donuts. How much does each donut cost?1.25+2x=.50+5xFind the cost of a donut in #17 Matthew and his 3 siblings are wedding a flower bed with an area of 9 square yards. If they shared the job equally,how much square yards of the flower bed will each child need to weed can somebody help me ! Who were the first Americans? In a paragraph of seven to nine sentences, explain why it is important to identify the content, intent, values, and point of view of editorials. Using a recent example of an editorial, give an example of each of the following: content, intent, values, and point of view. Citing explicit aspects of the recent editorial, justify your examples and provide an extended explanation of each.PLEASE HELP!