difference between boot disk and booting in 5 points​

Answers

Answer 1
[tex]Answer \: -[/tex]

In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.


Related Questions

define management styles

Answers

Answer:

man·age·ment style

noun

plural noun: management styles

the methods used by a person in managing an organization or group of people.

"the players seemed to lose confidence in his management style"

Explanation:

lol is that good?

Answer:

A Management style is the particular way managers go about accomplishing these objectives.

power steering belts should be checked for all of the following EXCEPT

Answers

You did not list the options.

16. A/An __________ is operated on the principle that the dying have special needs and wants that hospital personnel are too busy to handle.

Answers

Answer:

Hospices

Explanation:

A/An Hospices is operated on the principle that the dying have special needs and wants that hospital personnel are too busy to handle.

Answer:

a / an hospice is operated on the principle that the dying have special needs and wants that hospital personel are too busy to handle..

Explanation:

answer:: HOSPICE

¿Qué juegos pueden jugarse en un Raspberry 4 B con 2 GB de RAM?

Answers

Answer:

flow chart of sales amount and commission %of sales

Can anyone help me out with my photography questions?

Answers

Verifying, The answer above me is correct

Why is experience in their own factory setting
crucial for a manager in the manufacturing
business?

Answers

Answer:

How to Manage Manufacturing Operations Effectively

Ensure High-Quality Products. ...

Ensure High-Quality Equipment. ...

Know How To Maximize Resources. ...

Look Into Technological Advancements. ...

Check Your Customer Service. ...

Consider Reducing Waste. ...

Conclusion.

Explanation:

What are the steps for adding a Watch Window?
Select the cell to watch

Answers

Answer:

How to The Watch Window in Excel

Select the cell you want to watch.

Click the Formulas tab.

Click the Watch Window button. ...

Click the Add Watch. ...

Ensure the correct cell is identified and click Add.

Scroll to the area of the worksheet where you need to add or update values.

Update the cell values.

The _______ conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).

Answers

The HIGHLIGHT CELLS RULES conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).

why does my ps4 keep disconnecting from the internet

Answers

Answer:

It could be a variety of reasons depending on your form of connection. Wireless, it could be distance from router causing packet loss or disconnection. Wired, damaged or poor wire, or bad internet. What do you know about your connection?

c) Put these stages into the correct order.
(i) Script (ii) aim
(iii) Outline

Answers

Answer:

Aim

Script

Outline

Yan po answer, wag nang echoss mwa mwa

predict what the world would be like if no one tried to think critically. explain your predictions

Answers

The world would be in chaos and we would all be dead duh.

What do software engineers use as tools to provide automated support for the development of the system

Answers

Answer: CASE

Explanation:

A(n) _____ is a formal meeting between an employer and a job applicant
a.
background check
b.
gatekeeper
c.
interview
d.
personality test


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

C. Interview

Explanation:

Interview

Answer:

C. interview

Explanation:

edge 2022

When you empty the trash on your computer what happens?

Answers

It goes to your recently deleted after deleting from your recently deleted a file is saved from that image or png for legal use only

It is saved from that image or png for lawful usage only after being erased from your recently deleted folder.

What is recently deleted folder?

Content that users delete from their accounts now automatically goes to Recently Deleted. The content may then be permanently erased. Or, if users change their minds, they can recover the information from the Recently Deleted folder and add it back to their profile.

The Recently Deleted folder is where files go after you delete them from iCloud Drive or On My [device]. Your files are deleted from Recently Deleted after 30 days. You have 30 days to get a file back if you decide against it or unintentionally erase it.

Photos and movies that you've moved to your Recently Deleted album can be permanently deleted files remain there for 30 days. View here for more information on removing photos.

Thus, It is saved from that image or png for lawful usage

For more information about recently deleted folder, click here:

https://brainly.com/question/1445705

#SPJ5

hellowsss im bord :>
add my media pls its lil bunny(bunni) shoty (shawty)

Answers

Answer:

Bold

Italicized

Underlined

BOLDLY UNDERLINED

Okay! I will! ;)

I adore rabbits too!

I even made a book about them!

(It's not published tho :( )

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106

I am very stuck and still don’t know how these work.

Answers

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

Write a 20 charecter poem! for points! :)

Answers

you are wonderful as you are blue you are as blue as the sky the sky is beautiful as u are too you are red as Rose's and Rose's are full of you winter time is the mood full of winter and snow

A(n) ________ address is the address that external entities use when communicating with your network.

Answers

Answer:

IP adress

Explanation:

the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data

Which of the following programming scenarios would benefit most from the use of lists?

Answers

The programming scenarios which would benefit most from the use of lists is: B. writing a program to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score).

Computer programming involves the process of designing and developing an executable instructions (codes) or collection of data to perform a specific task.

In Computer programming, a list can be defined as an abstract data type that represents a finite number of either ordered or unordered values. Thus, a list can be used to perform the following tasks:

Store data items.Delete data items.Add data items.

A computer program that is used to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score) would benefit most from the use of lists because it comprises a set of numerical values that can be sorted in either an ordered or unordered array.

Read more on lists here: https://brainly.com/question/15092271

Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read, and computes the total and average of the input values (not counting zeroes). The program ends when the user enters 0. The average must be displayed as a floating point. All other values must be displayed as an integer. (For Python)

Answers

Answer:

The program was wrote in the version 3.9.5 of python and it's in the homework.txt file.

Lenovo Diagnostics - UEFI Version is preloaded into the BIOS on all Lenovo products except for ____________________.

Answers

Based on the information given, it can be noted that Lenovo Diagnostics - UEFI Version is preloaded into the BIOS of their products except the Ideapad models.

It should be noted that Lenovo diagnostic tools are used primarily to diagnose any hardware problems that a computer may have.

Lenovo diagnostic tools are available as a Bootable or a downloadable package. Lenovo Diagnostics - UEFI Version is preloaded into the BIOS of their products except for the Ideapad models.

Learn more about Lenovo on:

https://brainly.com/question/25397058

Which is the best autoclicker for godbrigding

Answers

The best auto clicker for godbrigding is

Additional Activities Direction: List down all the safety and work procedures in using newly purchased gadget. Write your answers on a separate sheet of paper.​

Answers

Answer: Keep your phone away from your body and head. Turn off your phone or turn on airplane mode at bedtime. Use headsets, preferably air tube, and speaker phone when possible. Don't carry your cell phone in your bra, shirt, or front pants pocket, especially if you're pregnant.

Explanation:

linnea is researching a type of storage that uses a single storage device to serve files over a network and is relatively inexpensive. what type of storage is linnea researching?

Answers

Considering the situation described above, the type of storage Linnea is researching is "NAS."

What is NAS in storage?

NAS is an acronym for Network Attached Storage. It is used as a file-level computer data storage server attached to a computer network.

NAS is usually applied in serving the files over Ethernet. It is cheaper and can be set up quickly.

Different Components of NAS.

Components of Network Attached Storage include the following:

CPUNetwork Interface CardsOperating SystemNFS and CIFS protocol, etc.

Hence, in this case, it is concluded that the correct answer is NAS

Learn more about NAS here: https://brainly.com/question/25705115

In 1956, the unit byte was coined by American statistician and computer scientist John Tukey
True or False (Give Explanation)​

Answers

Answer:

False

Explanation:

John Wilder Tukey was an American mathematician and statistician, best known for the development of the Fast Fourier Transform (FFT) algorithm and box plot. The Tukey range test, the Tukey lambda distribution, the Tukey test of additivity, and the Teichmüller–Tukey lemma all bear his name. He is also credited with coining the term 'bit' and the first published use of the word software.

1. It manages the computer's memory and processes, as well as all of its software and hardware.
A. Application software
C. Graphical User Interface
B. Computer Operating System
D. Micro Computer ​

Answers

Answer:

B. Computer operating system

Explanation:

the operating system (or OS) manages all of the hardware and software in the computer, and allows hardware and software to communicate.

We can also figure this out by process of elimination: Application software is just a fancy way to say apps, Graphical User Interface (or GUI) are menus that allow a user to use the computer through a visual representation (what you interact with using your mouse), and microcomputer just means a small computer like a laptop or a phone.

You see a whiteboard that has “8-10 years olds, interested in horses” written on it. This is MOST likely a description of:

A.
data management.

B.
target users.

C.
GUI.

D.
iterative development.

Answers

Answer:

B target users

Explanation:

because it targets 8-10 year olds that are interested in horses so it targets that audience range

The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will fit.

Answers

The goal of the BEST-FIT memory allocation algorithm is to find the smallest memory block into which a job will fit.
The goal of the BEST-FIT memory allocation algorithm is to find the smallest memory block into which a job will fit.

which of the following is a true statement?

A. in the customary system measurements are often expressed as decimals.

B. in the metric system measurements are often expressed as fractions.

C. in the customary system measurements are often expressed as fractions.

D. fractions are equally common in both the metric and customary systems.​

Answers

Answer:

C

Explanation:

yeah-ya........ right?

what is the term for delivering an application over the internet called?

Answers

Answer:

Cloud computing

Explanation:

The termnology which is used to describe the delivering of an application over the internet is called SaaS.

What is SaaS?

SaaS is an acronym for Software as a Service and it can be defined as a type of cloud computing delivery model that typicaly involves developing and making licensed software applications available to end users on a subscription basis and over the Internet, especially by centrally hosting these software applications within the cloud or through a third-party (vendor).

This ultimately implies that, Software as a Service (SaaS) is a termnology which is used to describe the delivering of an application over the internet.

Read more on SaaS here: https://brainly.com/question/24852211

Other Questions
Stacy is driving at a speed of 48 miles per hour. How many feet is she travelling per minute? help? please and thanks Given 7x + 2 > 58, which number is not in the solution set?1) 62) 83) 104) 12 Find the quotion 19.00/16 Fifty-five percent of the members of the junior varsity swim team wear glasses. Of the team memebers who do not wear glasses, 30 percent of them are in the 10th grade. To the nearest whole percent, what is the probability that a randomly chosen member of the JV swim team does not wear glasses and is in the 10th grade?. Can someone give me an example of a Hypothesis? The button on Jack's pants has a diameter of 8 millimeters. What is the button's circumference?Use 3.14 for n.millimeters. Pls Find the value of x three benefits attributed to all psychotherapies are: What are the three main elements of an effective introduction for an informative essay?A-the hook,supporting evidence, and examplesB- transitions,examples,and thesis statement C- the hook, background information, and supporting evidence D-background information,examples,and supporting evidence Which postulate proves the two triangles are congruent? SSSAASThere is not enought information to prove they are congruent AAASASASA Anna spent 8 hours reading a book. This is twice as long as Kim spent reading her book. Write anequation that can be used to find the number of hours, h, Kim spent reading her book. Which of the following function pairs are inverses? $12,500 is invested, part at 9% and the rest at 5%. If the interest earned from the amount invested at 9% exceeds the interest earned from the amount invested at 5% by $486.00, how much is invested at each rate? Whats is log17 divided by 4 List three limitations for measuring cell size Which particles within the atom are electricity charged?a. Electrons only.b. Neutrons only.c. Protons only.d. Electrons and protons.e. Protons and neurons. please answer even if there is already 1, last time i asked this i put a lot of points and a bot took them and i dont have time to wait for a second answer. im giving half points this time, 50, and i will give brainliest. dont be a cheapskate fishing for points either, dont answer if ur not gonna try. im sick of people doing that i just need help. its much appreciated if you can.every year in delaware there is a contest where people create cannons and catapults designed to launch pumpkins as far in the air as possible. the equation y = 15 + 110x - 16x^2 can be used to represent the height, y, of a launched pumpkin, where x is the time in seconds that the pumpkin has been in the air. what is the maximum height that the pumpkin reaches? how many seconds have passed when the pumpkin hits the ground? (hint: if the pumpkin hits the ground, its height is 0 feet)a. the pumpkins maximum height is 204.06 feet and it hits the ground after 7.01 seconds.b. the pumpkins maximum height is 3.44 feet and it hits the ground after 7.01 seconds.c. the pumpkins maximum height is 204.06 feet and it hits the ground after 3.44 secondsd. the pumpkins maximum height is 3.44 feet and it hits the ground after 204.05 seconds. there is somebody walking behind us.i think. ? this states that you can multiply the addends of a number and then add the products.