When does a kernel panic occur?
when the incorrect serial number is entered during software installation
when Dynamic-Ling Library (DLL) files are missing or damaged
when there are too many applications running on a computer at the same time
when an operating system finds a fatal error that it cannot safely recover from

Answers

Answer 1

Answer: when an operating system finds a fatal error that it cannot safely recover from

Explanation: "A kernel panic (sometimes abbreviated as KP) is a safety measure taken by an operating system's kernel upon detecting an internal fatal error in which it either is unable to safely recover or cannot have the system continue to run without having a much higher risk of major data loss. The term is largely specific to Unix and Unix-like systems. For Microsoft Windows operating systems the equivalent term is "Stop error", resulting in a bug check screen that presents the bug check code on a blue background in early versions of Windows (colloquially known as a "Blue Screen of Death" or BSoD), or on a green background on the Xbox One platform as well as in Windows 10 preview builds." wikipedia article on kernel panics

Answer 2

Answer:

It's D

Explanation:

I got it right on Edge

Have a wonderful day and have a Happy New Year. Hopefully 2021 is better than 2020.


Related Questions

Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above

Answers

The answer is D all of the above
D all of the above.

write the issue related to the cyber ethnic. ​

Answers

people may hack our person information.

Answer:

hiii ,and thank uuuu!!!!!!!

Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct command matches its use are given below:

Paste   Places data in its

Undo   Cancel a previous

Copy    Duplicates data on the clipboard

Cut       Removes data for places it on the clipboard

Redo    restores a previous

Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.

50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.

The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.

Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!

Answers

import java.util.Scanner;

public class JavaApplication46 {

   public static boolean passwordCheck(String pass){

       String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";

       boolean legit = true;

       if (pass.length()>= 8){

           for(int i = 0; i < pass.length(); i++){

               if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){

                   legit = true;

               }

               else{

                   legit = false;

               }

           }

       }

       else{

           legit = false;

       }

       

           return legit;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a password: ");

       String password = scan.next();

       System.out.println(passwordCheck(password));

   }

   

}

I hope this helps!

In most places of work, how long should it take someone to respond to an e-mail?

no obligation to respond

one hour

twenty-four hours

one week

Answers

Answer:

24 Hours

Explanation:

Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.

Answer: 24 hours

Explanation: It's correct

Linux does not provide a GUI for its users.
-True
-False

Answers

Answer:

False

I know for a fact this is false.

Brainliest?

Answer:

it is false why would they not

Step into my world
Bittersweet love story about a girl
Shook me to the core
Voice like an angel, I've never heard before
Here in front of me
Shining so much brighter than I have ever seen
Life can be so mean
But when he goes, I know he doesn't leave

[Pre-Chorus 1: Charlie Gillespie & Madison Reyes]
The truth is finally breaking through
Two worlds collide when I'm with you
Our voices rise and soar so high
We come to life when we're

[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
Perfect harmony

[Verse 2: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
You set me free
You and me together is more than chemistry
Love me as I am
I'll hold your music here inside my hands

[Pre-Chorus 2: Charlie Gillespie & Madison Reyes]
We say we're friends, we play pretend
You're more to me, we're everything
Our voices rise and soar so high
We come to life when we're

[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
Perfect harmony

[Bridge: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
I feel your rhythm in my heart, yeah-yeah
You are my brightest, burning star, woah-woah
I never knew a love so real (So real)
We're heaven on earth, melody and words
When we are together we're

[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah

[Outro: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
We say we're friends
We play pretend
You're more to me
We create a perfect harmony

Answers

Answer:

THIS SONG IS FIRE AND WHEN IT HAPPENED IN THE SHOW, I FAINTED*

Explanation:

Julie and the Phantoms is my favorite thing in the world.

Select the correct answer.
What does a script supervisor do?
O A. supervises the final edits of the script
OB.
helps the video editor to segregate useful clips from the junk
Ос.
revises the initial script before the process of logging
D. keeps a close watch on the monitor
E.
carries out assembly editing for a production house

Answers

Answer:

B

Explanation:

Name the type of software which provides the user interface. [1 mark

Answers

Explanation:

user interface, also sometimes called a human-computer interface, comprises both hardware and software components. It handles the interaction between the user and the system.

There are different ways of interacting with computer systems which have evolved over the years. There are five main types of user interface:

command line (cli)

graphical user interface (GUI)

menu driven (mdi)

form based (fbi)

natural language (nli)

A spreadsheet software program requires that users predefine each field’s data type. The software program is most likely programmed using a language that is
open.
predefined.
strongly typed.
weakly typed.

Answers

Answer:

Pretty sure its weakly typed

Answer:

strongly typed

Explanation:

In a science study group, Leonardo explains how atoms make up molecules. Talia repeats what Leonardo says in her own words. How is Talia practicing active listening? She is reflecting on what has been said. She is politely disagreeing with Leonardo. She is asking Leonardo a lot of questions. She is focused on only important information.

Answers

Answer:

A she is reflecting on what leonardo said but in her own words

Explanation:

Answer:

A: She is reflecting on what has been said.

Explanation:

Edge 2020

WRITE IN YOUR OWN WORDS:
What is a possible sign that your computer has been hijacked by Botware?

Answers

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

The template code provided is intended to take two inputs, x and y, from the user and print "pass" if one or more of the following is true:
x is not less than 4
y is not greater than 5 and x + y is less than 7
However, when using De Morgan's law to simplify this code, the programmer has made some mistakes. Can you correct the errors so the code functions as intended?
/* Lesson 6 Coding Activity Question 2 */
import java.util.Scanner;
public class U3_L6_Activity_Two{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
int x = scan.nextInt();
int y = scan.nextInt();
if(!((x 5) || x+y > 7))
System.out.println("pass");
}
}

Answers

import java.util.Scanner;

public class U3_L6_Activity_Two{

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       int x = scan.nextInt();

       int y = scan.nextInt();

       if(x>=4|| ((y < 5) && ((x+y) < 7))){

           System.out.println("pass");

       }

   }

}

I'm pretty sure this is what you're looking for. Best of luck.

For formatting and readability sake, the given code is re-written as follows:

/* Lesson 6 Coding Activity Question 2 */

import java.util.Scanner;        // 1

public class U3_L6_Activity_Two{ // 2

   public static void main(String[] args){     // 3

      Scanner scan = new Scanner(System.in);   // 4

      int x = scan.nextInt();     // 5

      int y = scan.nextInt();    // 6

      if(!((x 5) || x+y > 7))         // 7

      System.out.println("pass");    // 8

    }

}

The line that needs to be fixed is the if statement in line 7.

As given in the instruction, the code prints "pass" if one or more of the following is true:

i. x is not less than 4. This can be re-written as;

 ! ( x < 4 )

ii. y is not greater than 5 and x + y is less than 7. This can be re-written as;

! (y > 5) && (x + y < 7)

To have the right operand of ii to have a negation, we can re-write as follows;

! (y > 5) && ! (x + y > 7)  (i.e changing the less than sign to greater than and then putting the negation sign (!)). This is great so that the De Morgan's law will be applicable on both sides.

Note:

a. ! is the Java's equivalent way of writing the logical operator NOT

b. && is the Java's equivalent way of writing the logical operator  AND

Since one or more of the conditions in (i) and (ii) need to be true before the "pass" is printed, we can combine (i) and (ii) using the OR operator ( || ) as follows;

! ( x < 4 )  ||  ( ! (y > 5) && ! (x + y > 7) )           ----------------(***)

The De Morgan's laws are very great for making deductions, equivalence and valid proofs when using logical operators.

The laws are as follows;

i. ∼ (P ∧ Q) = ∼ P ∨ ∼ Q

This can be written as;

! (P AND Q) = ! P OR !Q

or in Java like syntax as

! (P && Q) = ! P || !Q

ii. ∼ (P ∨ Q) = ∼ P ∧ ∼ Q

This can be written as;

! (P OR Q) = ! P AND !Q

or in Java like syntax as

! (P || Q) = ! P && !Q

Using these laws, we can simplify our expression in (***) as follows;

! ( x < 4 )  ||  ( ! (y > 5) &&  ! (x + y > 7) )

a. Start with the right side i.e ( ! (y > 5) && ! (x + y > 7) )

The De Morgan's law (stated in (ii) above) will remove the negation from both terms in the right side term, change the && to || and then put a single negation to apply to both terms in the bracket to give the following;

! ( x < 4 )  ||  ! ( y > 5  || x + y > 7 )

b. Now, there are two main terms - ! ( x < 4 ) and ! ( y > 5  || x + y > 7 ) separated by ||

Apply the De Morgan's law (stated in (i) above) to remove the negation from both terms, then change the || to && and then put a single negation to apply to both terms.

! ( x < 4  && (y > 5  || x + y > 7))

The result in b is the simplified version of the condition in the if statement.

The complete and corrected code is therefore written as follows;

/* Lesson 6 Coding Activity Question 2 */

import java.util.Scanner;        // 1

public class U3_L6_Activity_Two{ // 2

   public static void main(String[] args){     // 3

      Scanner scan = new Scanner(System.in);   // 4

      int x = scan.nextInt();     // 5

      int y = scan.nextInt();    // 6

      if(! ( x < 4  && (y > 5 || x + y > 7) ) )         // 7

      System.out.println("pass");    // 8

    }

}

Read more about De Morgan's law at: https://brainly.com/question/13317840

Modern commercial air travel is more akin to urban mass transit than it is to recreational travel true or false?

Answers

Answer:

true

Explanation:

because who knows how it works that way

Answer:

false

Explanation:

i got it right

Umm, my computer is being rlly wierd and not letting me give brainliest to someone, anybody know what to do???

Answers

- Try restarting the device
- Use another device
- Re-install/Refresh your brainly page
- Wait for the issue to be gone
- Try doing it again
- Quit+Rejoin the app

Answer:

just restart it and when the computer is done restarting then repeat the process once more. This is what i did and it made a huge difference.

Explanation:

This resets the main hard drive and the reboots the system entirely. It helps clear out bugs and fixes any and all small issues.

Select all the lines that have a slope of 5/2

Answers

Answer:

Add a picture, then ask the question again.

Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.

Answers

Entry controlled loop - The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.

So, for and while loops are its examples.

Which component in a CPU is responsible for transferring
data from one functional component to another?​

Answers

The data bus carries data from components to others

Identify an advantage of writing HTML code manually.

You do not have to learn HTML.

You can figure out how the markup affects the function of the site.

You can see rendered HTML as you go.​

Answers

Answer:

1. You retain 100% control over your site and where it is hosted

2. Free WYSIWYG sites aren’t really free

3. You make yourself seem irrelevant to clients

4. You understand your own code

5. Your own code is nearly always more efficient

6. Your own code is more secure

7. It’s easier to iterate your own code

8. Your own code is original

9. Writing your own code helps you grow as a developer

Explanation:

You can choose the points you want. let me know if you need any further information.☺️

Please rate if you happy

Brailliest if you want

Answer:

B. You can figure out how the markup affects the function of the site.

Explanation:

its the correct answer :)

How has technology effected the way we communicate?

Answers

Indeed it has.

Advancements in technology and changes in communication generally go hand in hand. Landlines displaced the telegraph and cell phones replaced landlines. The arrival of the internet opened new doors of personal communication. E-mails replaced postal mails and social media took the place of text messages.

Communication technology, such as mobile phones, email, text messaging, instant messaging and social networking have had a profound effect on nearly everyone's business and personal lives. While technology makes communications faster and easier, at times it can also be intrusive and misinterpreted.

Increased isolation, reduced social interaction and social skills, and increased human-to-machine interactions are all a result of an overuse of technology, which has created a wall between many people globally.

Technology has the ability to enhance daily living from appliances to mobile devices and computers, technology is everywhere. ... In the rise of digital communication, technology can actually help communication skills because it allows people to learn written communication to varying audiences.

-Astolfo

PLS HURRY!!
Look at the image below

Answers

Answer:

1. A function can use variables as parameters.

2. A function can have more than one parameter.

3. The definition of a function must come before where the function is used.

Explanation:

The definition of a function can come before or after it is used - I am pretty sure it cannot be placed after the function is being used. It should always come before it is used, so this statement is false.

A function can use variables as parameters - this is true, variables are just labels to hold data.

A function can have more than one parameter - this is true.

A function must have a return value - functions do not always have to return values. It could simply print, so this statement is false.

The definition of a function must come before where the function is used - As said earlier, the definition of functions must come before it is used/called. This statement is true.

Hope this helps :)

Why are many otherwise safety-conscious people victims of Internet crime?
A. They are naïve and gullible.
B. Hackers are smarter than criminals in the non-digital world.
C. Effective security measures are very complex.
D. They have not been educated in safe digital best practices.

Answers

Answer:

D

Explanation:

:)

The people who get or become the victims of internet crime are those who don't have been educated about safety in digital space.

Internet crime is cyber fraud. The crime involves the computer and the network, as it may be targeted for the victim. One needs to have complete knowledge of cyber security and safety procedures.

Hence the option D is correct.

Learn more about the people victims of Internet crime

brainly.com/question/5633960.

HURRY PLEASE

The software that allows programmers to write and run code is called an IDE True O False​

Answers

Explanation:

true

................

Answer:

False

Explanation:

Hope this helps.


a.
Define a computer with its proper meaning.​

Answers

Answer:

Computer

Explanation:

a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.

Answer:

computer

Explanation:

An electronic machine that processes, stores data, and does calculations.

Someone plz im begging for ur help plzz??

Answers

Answer:

woah what subject is this-

Explanation:

Code Hs karal 3.4.2 lots of hurdles?? I cannot figure this one out at all

Answers

Answer:

codeHS 3.4.2: Lots of Hurdles answer

Explanation:

The ______ is designed to store audio data on computers and/or digital music players.

A. waveform
B. audio file format
C. sample rate
D. bandwidth

Answers

Answer:

audio file formats of computer

1) I hurt my leg yesterday, and I had to go to the doctor. 2) I asked my mother to write an excuse for me to get back in school. 3) She wrote that I had twisted my ankle doing exxercise. 4) She also wrote that I had been prescribed some medicine that could make me sleepy. 5) Finally, she wrote that she wanted to exttend her apologies for my absence. 7. Which of the first four sentences contains an error in spelling? Sentence 1 Sentence 2 Sentence 3 Sentence 4

Answers

Answer: Sentence 3

Explanation:

Because exxercise is spelled wrong its spelled exercise.

Answer:

the correct answer would be 3 AND 5

3)She wrote that I had twisted my ankle doing exxercise.

        it is spelled wrong, it needs to be exercise

5)Finally, she wrote that she wanted to exttend her apologies for my absence.

       it is spelled word, it needs to be extend

hope this helped

Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the slide thumbnails to the left of the main view?

A. He can right-click on Slide 6, then choose “Insert Before” and select Slide 8 from the options given.
B. He can right-click on Slide 8 and hold the mouse button while dragging up until the insertion point is after Slide 6.
C. He can left-click on Slide 8 and hold the mouse button while dragging up until the insertion point is after Slide 5.
D. He can left-click on Slide 6, then choose “Move To” and select Slide 8 from the options given.

Answers

Answer:

C

Explanation:

Most programs for slides allow the individual to click and drag a slide where it belongs.

C is the answer , it’s very easy

Help me pls!!! last question
Tori needs to turn her Turtle to the left 90 pixels. Which line of code should Tori use?

tina(90)
tina.back(90)
tina.left(90)
tina.right(90)

Answers

Answer:

tina.left(90)

Explanation:

In code if you want your character to turn left you put "left" in your code and if you want your character to go right type "right" and so on and so on so your answer is tina.left(90)

Answer: Option C is the correct line of code Tori should use.

tina.left(90)

Explanation:

I took the test and got it correct, you can trust me.

,  Hope this helps :)

Have a great day!!

Other Questions
Lita's softball team wone 8 games last month and 10 this month. What was the percent change in games the team won? Whose theory of love includes consummate, romantic, and companionatelove?A. SternbergB. RubinC. HatfieldD. AschSUBMIT Two two-digit numbers, 'AB' and 'BA', sum toproduce a three-digit number in which the second digitis equal to A. The addition is represented below. (Notethat the variables are used to represent individual digits;no multiplication is taking place).AB + BA= 1A2What is B? A bakery makes 40 different flavors of muffins. 25% of the flavors have chocolate as one of the ingredients. How many flavors have chocolate and how many dont? Plz help it would mean a lot Taking more than recommended levels of protein supplements may lead to all of the following EXCEPT?A DehydrationB Over-taxation of the kidneysC Increased aerobic enduranceD. Increased body fat Most Native American groups sided with the French. In your opinion, if theFrench had won the war, would things have been better for NativeAmericans in the future? Defend your position with specificreasons/evidence Why does John not want to have his signed confession displayed on the churchdoor?* Heterotrophs conduct cellular respiration and use what 2 things? *1. Water and Carbon dioxide2. hydrogen and oxgyen3. chemical and physicalPlease answer European countries set up colonies in Asia following the discovery of western and new eastern routes to these lands. What impact did these colonies have on the countries of Europe?a. These settlements paid taxes to their home governments, which made European countries and their monarchs richer.b. These settlements became homes for traveling merchants, who preferred to live outside Europe. How can forces be used to predict the movement of objects?Think in terms of objects experiencing forces in opposite directions. 25. The urethra extends from thesbladder to the rectumuterus to the vaginabladder to the outside of the bodyovaries to the uterus A cab company charges $2.75 per mile, plus an extra surcharge. Bernardo took a cab to the airport, which was 8 miles from his home. His total fare came to $29.50. Let x represent the number of miles and y represent the total cost of the cab ride.a. What is the slope-intercept equation of the line that fits this information?b. If a customer paid $35, how many miles did they travel in the cab? Prior to Taylor and Brown's (1988) important article, it had always been assumed that ________ is a cornerstone of good mental health.a) being realistic.b) being open and communicative with others.c) a high sense of self-worth.d) feeling fully in control.e) a supportive family of origin. 6. The sum of the measures of the angles in any triangle is 180 degrees. In triangle ABC, angles A and B have the same measures, while angle C is 57 degrees larger than the other two angles. Find the measure of angle C. a. 41 degrees b. 98 degrees c. 82 degrees d. 139 degrees Answer: 1. COORDINATE GEOMETRY Classily AABC with vertices A-2, -1), B(-1,3), and C(2,0) as scalene, equilateral or isosceles. work out a. 5 x 1/8b.1/7 x 6 plzz help i dont think this is geography but i need help anyway Question 2 (1 point)The theory that all of the continents were once in one location in the form of a"supercontinent" is called...PygmalionPatagoniaPangeaPonderosa List three ways society changed after the French Revolution!