Which of the following options is used to view a computer's memory properties?

a) Accessories
b) Device Manger
c) Sytem and Hardward
d) Control Panel

Answers

Answer 1
It really depends on the computer's operating system but I'm pretty sure its either C or D
Answer 2
Cant choose well its c or d

Related Questions

Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm

Answers

The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

When the packet leaves the router, which source and destination ip addresses will be contained in the packet?

Answers

Destination IP address and Source IP address.

âthese cameras are specially constructed to take pictures of fingerprints without distortion. they provide their own light through four bulbs, one in each corner. removing a bulb from any corner provides slanted lighting to show fingerprint ridge detail. they are

Answers

Fingerprint cameras is the answer

Is a document that specifies in detail required resources such as hardware and software?

Answers

A System Requirements Specification (SRS) (also known as a Software Requirements Specification) is a document that specifies in detail the required resources, such as hardware and software.

What is the System Requirements Specification?

System Requirements Specification is a system that is used for software. It helps to organize the application or software that can be used by multiple people that are using the software.

A Request for Proposal, or RFP, is a document created with the intention of precisely describing the necessary resources, such as hardware and software. For enterprises that must specify particular needs for their huge, sophisticated systems, these documents are very crucial.

Therefore, the document that specifies in detail the required resources is the System Requirements Specification.

To learn more about System Requirements Specification, refer to the link:

https://brainly.com/question/10097314

#SPJ5

You have purchased a used computer from a computer liquidator. when you boot the computer, you find that there has been a password set on the bios. you need to clear the password so that you can edit the cmos settings. you want to keep all other cmos settings. what should you do?

Answers

you need to total reset the computer back to manufacture reset and then you can put a password that you would like to use

A(n) ________ software installation copies all the most commonly used files and programs from the distribution disc to your computer's hard drive.

Answers

A full software installation refers to copying all essential files and programs from the distribution disc to a computer's hard drive, ensuring complete functionality without needing the original media.

A full software installation copies all the most commonly used files and programs from the distribution disc to your computer's hard drive. This type of installation ensures that all components necessary for the software to function correctly are available on the system without the need to load additional components from the original distribution media. A full installation is often recommended when you have ample disk space and want to avoid the potential need to insert the distribution disc for additional features or components in the future.

Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version

Answers

Using a database of precomputed hashes from sequentially calculated passwords called a rainbow table, an attacker can simply look up a hashed password and read out the text version. Each column in the rainbow table uses a different reduction function. The function of the table is reversing cryptographic hash functions. 

James wishes to access a certain software service via different computing systems over the Internet. What technology provides software on demand over the Internet?

Answers

Cloud Computing?
Hope I helped.

Cloud computing is the technology that will enable James to access a certain software service over Internet and provide software on demand.

Cloud computing delivers shared pool of configurable computing resources and allows customers to acquire resources at any time and then delete them the instant they are no longer needed. This technology besides the fact that it provides on-demand self-service , it encompasses the characteristics of grid computing  and the characteristics of utility computing.

The standard name of the java compiler is

Answers

The standard name of the java compiler is javac.

Computer files containing nothing but printable characters are called ____ files.

Answers

Computer files containing nothing but printable characters are called text files.

A _________ contains sample content and slide layouts in addition to background, color, and font selections.

Answers

I'm thinking this sounds like a power point presentation.

Software that allows the application software to interact with the computer is called __________.

Answers

Operating system software or OS for short.

Final answer:

The operating system software is the software that allows application software to interact with the computer, managing hardware resources and supporting user tasks. Microsoft Windows is an example of such software, providing an environment for other software like Microsoft Office to function.

Explanation:

Software that allows the application software to interact with the computer is called operating system software. The operating system (OS) is a vital component of the computer system because it manages the hardware resources, and provides an environment where application software can run. The OS includes human-software interactions in complex automated systems and supports the decision-making processes of workers.

Examples of operating systems include Microsoft Windows, which is one of the most prevalent in personal and office computing environments. Complementary software such as Microsoft Office, which includes programs like Word, Excel, and PowerPoint, is part of the office suite software category that works in conjunction with an operating system to enable productivity tasks. Database, email, and other utilitarian software like Microsoft Access and Email software enhance the functionality and user interaction with the computer system further.

What is search engine

Answers

Search engine is a software to help find you results over the internet.

Examples of search engines are: Google, Safari, Yahoo etc.
A search engine is a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.


Examples: Safari, Google, Bing, Yahoo...

The user state migration tool uses several files to control the migration process. what is the file format of these files?

Answers

Salutations!

The user state migration tool uses several files to control the migration process. What is the file format of these files?

The user state migration tool uses several files to control the migration process. The file format of these are xml. Its a metalanguage which lets us custom markup languages. Markup languages helps us display data/documents over the the Internet.

Hope I helped :D

The area where a blast originates is referred to what perimeter/isolation zone

Answers

The area where a blast originate from is referred to as PERIMETER. After a bomb blast incident, the first responders has to map out a safe pre-blast perimeter based on the requirements of Bureau of Alcohol, Tobacco, Firearms and Explosives [BATFE]. After this, the first inner perimeter, also called hot zone must be established. This is where the blast originated from and it is the point where victims rescue and treatment will start.

"which part of an information system consists of the rules or guidelines for people to follow?"

Answers

Procedures are part of the information system that consist of the rules or guidelines for people to follow. Procedures are one of the main components of the information system, together with the hardware, software, telecommunications, databases, data warehouses and human resources. The procedures are policies that specify the requirements and standards for operation of the computer.

How to hook your bluetooth to your computer?

Answers

Your computer needs to have a bluetooth interface, built-in or in the form of a USB dongle. Then you need to go into a process of discovering, connecting, pairing and bonding.

This means that typically your BT device starts emitting its presence (this is called advertising), and in your BT manager software you pick this up and pair with the device. Sometimes without a "secret", sometimes by entering a passcode, depending on the device.

How do you explain technical material to non-technical people?


Use analogiesReword and repeat key conceptsEmphasize
important conceptsAsk questions after explaining
Only explain the things I consider important 
More than one of the above


Answers

I would use all of these techniques to explain technical concepts to non-technical people. Using analogies is a good way to do this as it uses common everyday experiences to illustrate concepts, like opening a pop bottle and having the gas bubbles rise to escape as an example of how gas can be dissolved in water.Emphasizing important concepts is also important to reinforce them. Asking questions helps to verify if the concept was understood. Only explaining the things considered important means not overwhelming the non-technical people with too much information.

True or False: A combination of a solid yellow and a broken yellow line means that you can pass only on the side that has the broken yellow line.

Answers

True, because the broken line gives you the ability to cross and pass, with the solid line you are not allowed to pass.
Answer:

The statement is True

Explanation:

There are certain strips and lines drawn on the roads. They are white and yellow. According to traffic rules broken White Line allow you that you may change lanes if it is safe to do so. Solid White Line requires you to stay within the lane and also marks the shoulder of the roadway. YELLOW LINES mark the center of a two-way road used for two-way traffic. You may pass on a two-way road if the yellow centerline is broken therefore we can say that the statement is true.

A wireless device’s ____ refers to the physical distance between the access point and the wireless device.

Answers

I think its a router, I'm not sure.

Which task is considered part of network performance management
A. Connecting network servers to a gateway
B. Protecting the network from unwanted intruders
C. Installing and configuring the network operating systems
D. Monitoring speed of the networks internet connection

Answers

I think D I hope this helped

Answer:

D. Monitoring speed of the networks internet connection

Explanation:

The Network performance management has as its main task the management of the local network, internet connection as well as related computing resources directly or indirectly. Installation, configuration and maintenance of operating systems and IT infrastructure services are also responsibilities of this professional.

Web-based application software is software that ________.

Answers

Web-based application - this is a special kind of applications that operate in the global Internet via HTTP. The user interacts with the program, usually carried out through the browser.

Which type of network topology has a central networking device which manages the network and acts as a communications conduit for all network traffic?

Answers

A star network topology 

You need to attach an rj45 connector to the end of a cat 6 utp cable. which tool should you use

Answers

The tool one should use to attach an RJ45 connector to the end of a cat 6 UTP cable is crimping tool.

What is a tool?

A tool can be used to join or detach or measure different things.

UTP stands for urinating triphosphate. The CAT 6 UTP cable is an ethernet cable.

One can quickly and easily crimp an RJ-45 connector to a cable with a crimping tool. Using a crimping tool, strip away a portion of the sheath, untangle and arrange the wires in the correct order, fit them into the connector, and use the crimping part of your tool to squeeze the small pins into the wires and secure the connector.

Thus, the crimping tool is used to connect RJ45 connector to the end of a cat 6 UTP cable.

Learn more about tool.

https://brainly.com/question/19707541

#SPJ2

If you are truant in your school attendance your driving privilege is suspended until you provide proof you have attended school for --consecutice days

Answers

that you have attended school for 30 days, 

also, the wrong section to post the question. 

When using a spreadsheet, sum in the expression =sum(b10:b16), is called a(n) ________?

Answers

It is called a function.

Which symbol is used to represent a single character during a pattern search?

Answers

In a regular expression, the dot (.) represents a single character.

You can separate words in a macro name by using the ____ character

Answers

You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

A macro is a fragment of code which has been given a name. The name of a macro is a unique string that begins with a letter or a @, #, $, _ symbol. You can separate words in a macro name by using the underscore character. This character tells  that the current statement isn't finished yet and it continues on the next line. So, it's used to split a single line of code over two lines.

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy?

Answers

a cyber gang or cyber theif

The special memory storage areas built into the cpu are called ________.

Answers

The answer is "registers."
Other Questions
Which project leadership role includes the task of handling administrative responsibilities for the team and negotiating with users who might have conflicting requirements or want changes that would require additional time or expense? department manager system analyst project manager project coordinator? By ruling in James McCullochs favor in McCulloch v. Maryland, the Supreme Court agreed that Let f(x) = 27x5 33x4 21x3 and g(x) = 3x2. Find f of x over g of x The aggression at dog shows when its owner tries to take its food bowl is called _______ aggression. (MC)Read the sentence and answer the question that follows: The commercial showed an enormously tall basketball player easily changing a light bulb in a ceiling light fixture. Based on the rest of this sentence, what is the best meaning of the word enormously in this sentence? Barely Extremely Overwhelmingly Unusually (My Choice Can't Decide) A canon is a compositional technique used in which of the following?A. Word Painting B. PolyphonyC. Imitative CounterpointD. Polychoral whats the main idea in this paragraph In American society, romantic love is considered the main reason for people to marry. On the other hand, in some societies, romantic love is considered a form of obsession or madness. In fact, even in many societies where "true love" is not considered a form of insanity, arranged marriages are still the norm. For example, in many cultures it's believed that marriage is basically an economic arrangement. Thus, a farmer needs a wife both to bear children and to share the farm work while raising new "hands" as additional farm labor. In other societies, marriage is mainly about cementing connections between families. Indeed, most marriages between members of European royal or aristocratic lineages were primarily aimed at creating trust, loyalty, and mutual obligations between privileged and powerful families. Find the value of x to the nearest tenth. See linked picture below. Thanks! Jared is in charge of production in a factory that makes lightbulbs. The factory made 2,648 lightbulbs over the weekend. Jared wants to pull a sample of these bulbs for testing. Which sample would give Jared the most-accurate test results? a sample consisting of every 20th lightbulb a sample consisting of every 40th lightbulb a sample consisting of every 50th lightbulb a sample consisting of every 100th lightbulb What's 1012 written as a fraction in simplest form? A. 56 B. 106 C. 35 D. 512 Which part of the American Dream is challenged in The Great Gatsby? A.Inheriting property is a privilege. B.Fortune will abandon you when you most need it. C.No one can be rich and moral. D.Success allows one to live out one's dreams. When Oglethorpe designed the city of Savannah, what was his primary intention? The meaning of look before you leap. Think today and speak tomorrow. Is it similar meaning or contradictory Which line has an undefined slope? A y = 0 B y = 2 C x = y D x = 2 BARNEY'S BICYCLE SHOP IS SELLING T-SHIRTS AT THE LOCAL HEALTH FAIR. THEY PLAN ON SELLING SHIRTS FOR $8 EACH. TO HAVE THE SHIRTS MADE, BARNEY'S BICYCLE SHOP PAYS THE SHIRT MAKER $3.50 PER SHIRT PLUS AN INITIAL FEE OF $63. HOW MANY SHIRTS MUST BARNEY'S BICYCLE SHOP SELL BEFORE THEY CAN MAKE A PROFIT?A. 9 SHIRTSB. 8 SHIRTSC. 14 SHIRTSD. 11 SHIRTS BRAINLIEST ANSWER!!!!!!what is the name for someone who is not from a certain area?Please help!! 2. A ski resort is building a new ski lift that will transport tourists from the base of the mountain to its highest point. This mountain has a vertical height of 200 yards, and the ski lift will rise at an angle of 40 degrees. When the project is completed, how many yards, d, will a tourist travel from the base of the mountain to its peak?Part I: Sketch a figure to illustrate the scenario above. Label the vertices and the lengths that are given in the question. (3 points)Part II: Using your sketch from Part I, write an equation using a trigonometric ratio to find the distance a tourist will travel from the base of the mountain to its peak. Round your answer to the nearest 100th. Show your work. (2 points)3. Darcy mounted a motion sensor so it would light a path to the door on her deck. If you know AB = 10 feet, and BE and BD trisect ABC, what is the perimeter of the deck area to the right of the beam of light (BDC)?Part 1: What other angles or sides of BDC can you label given that side AB is 10 feet, BE and BD trisect ABC? Label the diagram accordingly, and explain your reasoning. (4 points)Part 2: Use the trigonometric ratios 30 and 60 to calculate and label the remaining sides of BDC. Show your work. (3 points)Part 3: Use the Pythagorean Theorem to calculate the length of side BD. Does this method verify the length you found using trigonometric ratios? (2 points)Part 4: What is the perimeter of the area to the right of the beam of light on Darcy's deck (BDC)? Show your work. Use your calculator to round your final answer to the nearest foot. (3 points)4. Two cars are starting from positions that are 20 miles apart. They are both headed for the same intersection, as depicted in the diagram below. Car A is traveling at 30 mph, and Car B is traveling at 45 mph. Which car will reach the intersection first?Part I: Use the law of cosines to determine how far Car B has to travel to reach the intersection. (2 pointsPart II: Use to determine the time necessary for Car A to reach the intersection. Round your answer to the nearest hundredth of an hour. (1 point)Part III: Use to determine the time necessary for Car B to reach the intersection. (1 point)Part IV: Which car reaches the intersection first, and by how many hours? (2 point5. Solve for the missing length and the other two angles in the triangle below.Part I: Use the law of cosines to find the missing third side. (2 points)Part II: Use either the law of cosines or the law of sines to find the measure of angle C. (2 points)Part III: Use any method you like to find the measure of angle B. (1 point)6. Solve the triangle below.Part I: Use the law of cosines to find the measure of angle B. (2 points)Part II: Use the law of sines to find the measure of angle C. (2 points)Part III: Use any method you like to find the measure of angle A. (1 point)7. Assume two people, Swanson and Suzie, are standing 35 feet apart and are watching a boat race. At a given moment, Swanson approximates the angle formed by the lead boat, himself, and Suzie to be . Suzie approximates the angle formed by the lead boat, herself, and Swanson to be . How far is the boat from Swanson?Part I: What is the missing angle in this triangle?(1 point)Part II: Use the law of sines to find the distance from Swanson to the boat. (2 points)8. Solve the following triangle for all missing sides and angles.Part I: Find the measure of angle B. (1 point)Part II: Use the law of sines to find the length of side a. (2 points)Part III: Use any method to find the length of side c. (2 points) Approximately how many joined Nathaniel Bacon in attacking and killing Native Americans? A:4,000B:1,000C:50D:100 The most critical thing to do before you pass another vehicle is: A. Check to the rear B. to the left side C. Check ahead D. Check to the right side Explain why rational number is either a terminating or repeating decimal? Steam Workshop Downloader