answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
2 years ago
15

Sara is having a tough time finding the cause of a problem on a computer she is troubleshooting. She found a possible problem bu

t is not sure if she is correct. In case she is wrong, Sara does not want to test her theory, because doing so might worsen the problem. ​ What would you advise Sara to do?
Computers and Technology
1 answer:
sp2606 [1]2 years ago
7 0

<u>I will advise Sara to do research about the problem on the Internet.</u>

<u>Explanation</u>:

Internet is a network that helps in connecting one computer with other globally. Communication between the computers is possible until the computers are connected with to the Internet. Internet helps in getting information from any computer and interacts with the users of the computer.

Sara finds some issue with her computer. She was troubleshooting, but she could not find the exact problem. She was not sure with the problem that she found. It is better for Sara to do research about her problem on Internet and find the solution.

You might be interested in
Leah wants to create a PowerPoint presentation for a history report about the progressive era in the 1900s. To
Nutka1998 [239]

Answer:

File

Explanation:

8 0
2 years ago
Read 2 more answers
You buy a $3,500 car and finance it through the car dealer. the contract says if you are two months delinquent with your payment
photoshop1234 [79]
The car owner acquired his car because the car dealer offers him a financing credit services. It is part of the contract that the car owner should pay in monthly basis. It is a fact and part of the contract also that once the car owner failed to pay 2 months of his contribution, the car dealer will get his car back.
6 0
2 years ago
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
2 years ago
When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it
Effectus [21]

Answer and Explanation:

Memory Cache speed the processes of the computer. It stores instruction and data. The computer has two types of memory cache

L1 cache, L2 cache, and L3 Cache i.e., Level 1, Level 2 and Level 3

L1 cache is built on the processor chip and has a minimal capacity.

L2 cache is slower than L1 and has a large capacity. Mostly processor uses ATC advanced transfer cache.

When the processor needs instruction, it searched in order L1 cache than L2 cache and L3. If any data or instruction is not found, then search slower speed medium such as a hard disk and optical disc.

3 0
2 years ago
Sophie often makes grammatical errors in her document. Which feature of the Spelling and Grammar tool can she use to understand
Ivanshal [37]

Since Sophie often makes a lot of grammatical and spelling errors in her document, it might be best for her to use a feature available in Microsoft Word that would help her better in understanding what her mistakes are, which is something that (D) Explain does.

Explain would tell Sophie which part of her sentence is wrong, or what word did she mistype, and what better way to phrase a sentence to avoid fragmented ones.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
    13·1 answer
  • Write a copy constructor for carcounter that assigns origcarcounter.carcount to the constructed object's carcount. sample output
    15·2 answers
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • What are the advantages and disadvantages of using a very large memory cell size, say, W = 64 instead of the standard size W = 8
    15·1 answer
  • The ____________ is an efficient method to mount, power, and organize electrical motor control, automation, and power distributi
    5·1 answer
  • 1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of
    10·1 answer
  • 15) The codes for class Hotel has been defined in two separate files Hotel.h, and Hotel.cpp. Which of the following statements i
    12·1 answer
  • A company moves a popular website to a new web host. Which of the following will change as a result?
    15·1 answer
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • Which are types of lines? Choose three answers.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!