What is the importance of knowing the appropriate hand tools for Computer System Sercvicing​

Answers

Answer 1

Answer:

The importance of having knowledge in using the appropriate tools for computer system services is knowing what tools you need in different situations, like what to use if there are screws that need to be removed or put back

Explanation:

I hope to help u dear


Related Questions

prepare a short report of some technological devices??
please help me brainliest​

Answers

Answer:

Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.

For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.

It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.

In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.

Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.

Explanation:

You are welcome! ;D

In disc brakes, pads are forced against the of a brake disc​

Answers

Answer:

Explanation:

It's the surface the brake pads contact. When you step on the brakes, pressurized brake fluid pushes against the pistons inside the caliper, forcing the brake pads against the rotor. As the brake pads press against both sides of the disc, the friction stops the wheel's rotation.

You are able to add Sheets to your workbook by pressing the + button by the sheet tabs.

O True

O False

Answers

Answer:

True

Explanation:

Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em

A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.

Answers

Specific tasks such as the remembrance of key information when filling out Web forms can be performed by: personal agent.

A personal agent is also referred to as user agent and it can be defined as a computing software or hardware-based system that is typically designed and developed to perform specific tasks on behalf of an end user.

This ultimately implies that, a personal agent is an intelligent computer hardware or software program that can be configured to perform specific tasks on behalf of an end user.

For example, a personal agent can be configured to remember key information when filling out Web forms.

Read more: https://brainly.com/question/21656851

You want to allow RDP 3389 traffic into your network for a group of users to access a particular workstation that has a special application in your office. Which endpoint security tool would you use to make this happen

Answers

Firewall Rules often monitor the control information that is present in individual packets. The endpoint security tool would you use to make this happen is firewall rules.

Rules are often known to be guarding looks into the control information.

The Rules often block or allow those packets using the rules that are spelt out on these pages.

It is also given mainly to computers or to policies that are assigned to a computer or collection of computers.

Learn more from

https://brainly.com/question/15681183

You have a server with Windows Server 2016 installed on Disk 0, a basic disk. You're using the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents

Answers

Answer:

Convert the new disks to GPT. Create a spanned volume using Disk 1 and Disk 2.

Explanation:

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

to center data in a cell, click the ____ button on the ribbon.

Answers

To center data in a cell, click the center  button on the ribbon.

Data in a cell can be aligned either  horizontally or vertically .

For the  horizontal alignments, we have

against the left border, against the right border, and in the centre.

For the  vertical alignments, we have

against the top border, against the bottom border, and in the middle.

To center data, the following steps should be followed.

1.Click the cell where you want to center the data.  

2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.

3.Click the  drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.

who plays pokemon shield or sword

Answers

Answer: I haven’t played but i wanna

Explanation:

Answer:

no

Explanation:

i don't

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

What is monitor ?why it is necessary for computer system ?​

Answers

Answer:

Monitor is an output device that displays information in pictorial or text form. A monitor usually comprises a visual display, some circuitry, a casing, and a power supply.

 It is important as it allows for proactive response, data security and data gathering and the overall good health of a computer system.

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

What is the name of the type of keyboard that contains a coiled spring and a rocker, and provides both tactile and audible feedback.

Answers

Answer:

Buckling Spring

Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros​

Answers

The feature of spreadsheets that will help Rohan decide where to invest his money is;

Option A; Solver

Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".

The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results.

The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.

Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.

Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.

Read more at; https://brainly.com/question/15032995

________ is a computer application that enables a firm to combine computerized functions of all divisions and subsidiaries of the firm into a single, integrated software program that uses a single database.

Answers

Answer:

Yash Sharma Hemant Kumar

which of the following are benefits of designing a scalable system? choose 3 options.

-guaranteed systems access for all users

- users may never know that a site has experienced tremendous growth

- ability to respond to user volume issues more quickly

- system will never need to grow again

-ability to maintain a high level of service for customers ​

Answers

I asked my brother since he’s kinda of tech geek and he said

The 1st, 3rd, and 5th answers are correct

Hope this helps and I hope my brother is not wrong.

Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company's IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database

Answers

Considering the situation described above, the rogue AP system detection probe that will allow Bob's company's IT department to monitor the airwaves for traffic, amongst others, is Wireless Device Probe.

This is because the Wireless Device Probe possesses a WiFi interface that occasionally produces a wireless probe procedure through the effective transmission of a control frame.

This process is often referred to as 'probe request''.

The purpose of Wireless Device Probe is to ensure that closer wireless access points transmit information about wireless networks that are accessible for connection.

Hence, in this case, it is concluded that the correct answer is "Wireless Device Probe."

Learn more here: https://brainly.com/question/10249897

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

Yes









Because you didn’t block them
Yeah you can since they aren’t blocked

How can she change that value so it is reflected in the chart in her presentation?

Answers

Answer:

She can change the value in the mini- spreadsheet for the chart in PowerPoint.

Explanation:

Answer:

What she said above or below me

Explanation:

How will you select the range of cells in excel . ​

Answers

Answer:

just left click the cell that you want and drag your mouse towards how much you want to select I guess

Answer:

To select a range, select a cell, then with the left mouse button pressed, drag over the other cells. Or use the Shift + arrow keys to select the range. To select non-adjacent cells and cell ranges, hold Ctrl and select the cells.

Explanation:

Which of the following is a type of equation which returns a value such as TRUE or
FALSE?

A. Argument
B. Expression
C. Nest
D. Control

Answers

Answer:

C

Explanation:

True HOPE THIS HELPS BOY/GURL AH

The type of equation which returns a value such as TRUE or FALSE is logical.

Which formula gives the logical value in the form of true or false?

A logical value is known to be The TRUE and FALSE functions

An example is if you type “=TRUE()” into a cell, it is said to often return the value TRUE and when you type “=FALSE()” it will also return as FALSE.

Learn more about equation  from

https://brainly.com/question/2972832

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

When using ________ access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

Answers

When using sequential access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

The illusion of motion created by the consecutive display of images of static elements

Answers

Answer:

The term illusory motion, also known as motion illusion, is an optical illusion in which a static image appears to be moving due to the cognitive effects of interacting color contrasts, object shapes, and position.

Explanation:

first what all this about is about animation the creation graphic of cartoons and some sci fi fiction

WILL MARK A BRAINLIEST!!! PLS HELP!!!





Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

man, just got rick rolled brb going to cry

Explanation:

Daijōbu desho. Datte Kimi yowai mon.

During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.

Answers

Answer:

developed and tested.

Explanation:

Other Questions
Write down 20 verbs in German with their translation100 points for this Please help. 7th grade homework. All of these has to be turned in by tomorrow morning. Shipbuilding was a large part of NewEngland Industry because of theA. wood resources they hadB. rivers that they wanted to travelC. maps they were trying to create 2. Calculate the heat of combustion of C6H14(l) in kJ/mol if 1.66 g of C6H14(l) were ignited in a calorimeter containing 2750. g H2O. A 3.54C temperature rise was observed. The calorimeter constant is 11.2 kJ/C. The specific heat of water is 4.184 J/gC. Simplify.36x4y6z212xy8z2 I NEED THIS DONE NOW ASAP, PLS HELP MEWhat important piece of information should a sketch include in addition to the numeric dimensions? Is 150% of a number greater than or less than the number?. Put the following equation of a line into slope-intercept form, simplifying all fractions. 4y-4x= -28 According to the beginning of wisdom which of the following is not consistent with the old testament. PLEASE PLEASE What was the Manhattan Project?Select one:a.It was the American effort to build a nuclear bomb.b.It was the British effort to crack the Enigma machine.c.It was the Canadian effort to produce enough uranium for the war effort.d.It was the German effort to build unmanned rockets. HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! the noon sun is directly overhead at the equator during: emission meaning in biology? solve the following equations A) 2 (A + 5) = 16 b) 4 p - 2/3 = 7/3 c) 3y/2 + 8 = (-4)pls pls pls pls pls pls answer steps PLEASE HELP ME QUICK ILL GIVE 85 POINTS Why did the Union fall back on the Anaconda Plan? answer in a paragraph using quotes.Pick one of the laws in the reading (Division of Things or Theft) and explain how that law works. Once you have done that, explain why you think these laws are so specific about the situations they cover. Pls answer the rest for me Ill give you brainilist Question #4Generally, when receiving a business card from an internationalbusiness person you should:O Set the card aside so you can study it later.O Thank the person for giving you their card.O Immediately place the card in your pocket.O Carefully review the card and then put it in a special place. Someone please help me!