Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that you use primarily for writing essays for school and browsing the web at home. The computer is slowing down some, so you check the date on it. Your computer is 6 years old. It is amazing that it lasted this long. You probably need a better CPU and more RAM. What should you do?

Read The Following Scenario, And Then Decide If You Should Upgrade The Computer. You Have A Desktop That

Answers

Answer 1

Answer:

Upgrade

Explanation:

EDGE 2021

Answer 2

Answer:

B. Upgrade

Explanation:

Because you have a desktop, upgrading the CPU and RAM are an easy and inexpensive fix. Upgrading a laptop is more difficult and often requires purchasing a new computer.

I hope this helps<3

Have a nice day everyone<3


Related Questions

what might be some challenges if you’re trying to design a product for someone

Answers

Answer:

failure

Explanation:

if someone dosnt like it

Failure,a picky person,time consumption if they can’t make up there kind,wasting time and money,

What is a working model used to test a design called?

Answers

A working model used to test a design is a prototype.

Answer:

mockup is the working model

Select the correct category of cybersecurity described.

It prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks.

network security

information security

operational security

infrastructure security

Answers

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

Answer:

network security

Explanation:

Huzaifa is a grade 5 student who is very enthusiastic to learn coding in computers. He asks his computer teacher to help him choose a language to code. Which level language will the teacher recommend Huzaifa?

Answers

Answer:

High level language.

Explanation:

High level language can be defined as a programming language which is generally less complex than a machine (low level) language and easy to understand by the end users (programmers).

This ultimately implies that, a high level programming language is typically a user friendly language and as such simplifies coding or programming for beginners.

Some examples of high level programming language are Python, Java, C#, Ruby, Perl, Visual Basic, PHP, Cobol, C++, Fortran, Javascript, etc.

In this scenario, Huzaifa is a grade 5 student who is very enthusiastic to learn coding in computers. He asks his computer teacher to help him choose a language to code. Thus, the language level the teacher will recommend to Huzaifa is a high level language.

Which portion of the Outlook interface contains commonly accessed commands that a user will require frequently
and is able to be customized by the user based on their particular needs?
Quick Access toolbar
ribbon and ribbon tabs
Tell me box
Title bar

Answers

Answer:

A

Explanation:

on edge 2021

what are the hardware and software components of a computer​

Answers

Answer:

I. Hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

II. Software components of a computer includes operating system, registry keys, antivirus, media player, word processor, etc.

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.

what is a similarity and difference of email and bulletin board?​

Answers

you can use both to write and the different is one is mobile ..

3. One advantage of online classrooms over physical classrooms is that:
A-You can usually take the classes on your own time.
B-It is easier to access class materials.
C-You can communicate with your teacher more effectively.

D-The quality of the teaching is usually better.


Answers

Answer:

c

Explanation:

You can communicate your teachers

is willingness to be held accountable for your actions

Answers

Answer:

Responsibility.

Explanation:

Responsibility is the willingness to be held accountable for your actions.

A responsible person would always take measured and careful step or engage in well-thought-out actions that will add value to their lives and positively impact their immediate environment.

This ultimately implies that, responsibility is an individual characteristic which typically involves acting in a positive manner and owning up to any of your actions.

In a nutshell, responsibility requires that an individual does the right thing, the right way, at all times.

What is the value of creating recurring tasks?

makes task reminders more noticeable
makes task reminders more efficient
saves time spent manually creating multiple tasks
saves time spent manually configuring recurrence settings

Answers

Answer:

✔️saves time spent manually creating multiple tasks

Explanation:

I did it on edge

Answer:

saves time spent manually creating multiple tasks

Explanation:

it correct on edge 2021

How has the Internet expanded the reach of all of these types of media?

Answers

the Internet made it easier for us to find information or to communicate with one another.

how does a USB flash drive get its files?

Answers

Answer:

The flash drive is inserted into a computer's USB port, or type-A USB connector. The USB connector communicates between the drive and the computer. The computer recognizes the drive as a separate hard drive, allowing users to move files from the computer's hard drive to the flash drive.

Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which of the following reasons?

Answers

Answer:

You are gonna waste money and it might not be the best idea

Explanation:

Answer:

waste money

Explanation:

What is binary ????????

Answers

Binary (or base-2) a numeric system that only uses two digits — 0 and 1. Computers operate in binary, meaning they store data and perform calculations using only zeros and ones. A single binary digit can only represent True (1) or False (0) in boolean logic.1. Binary is a base-2 number system invented by Gottfried Leibniz that is made up of only two numbers: 0 and 1. This number system is the basis for all binary code, which is used to write data such as the computer processor instructions used every day.

Answer:

it is a numeric system that only uses two digits 1 and 0, computers can operate using binary meaning they store data and perform calculations only using 0 and 1

Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Which option should she choose?

Small Booklet style
Medium Booklet style
Memo style
Card style

Answers

Answer:

D

Explanation:

did the quiz

Answer:

D: card style

Explanation:

just took the unit test on edge and made a 100%

Na2CO3 → Na2O + what

Answers

Answer:

CO3

Explanation:

Answer:

C02

Explanation:

Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
queries

forms

procedures

Answers

Answer:

procedures

Explanation:

Answer:

themes

Explanation:

it refers to the ability of different parts of a computer to work together as one. please answer this​

Answers

Multiseat o multipuesto,

Which is the hanging indent on the rulern

Answers

Answer:

indent is a space between the red line.

Explanation:

Yes or no If the space is crowned make sure there are no white spaces​

Answers

Explanation:

huh??

I didn't understand

A short-range wireless network is called:
cable modem
cell site
wi fi
personal digital assistant

Answers

Answer:

WiFi

Explanation:

WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. The standard range or distance covered by WiFi is about 50 meters (160 feet).

Hence, a short-range wireless network is called WiFi.

In this assignment, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a clear theme and tell a story. You may pick any school-appropriate theme that you like.

The program must include a minimum of:

5 circles
5 polygons
5 line commands
2 for loops
1 global variable
You may wish to use the standard code for simplegui graphics below:
In Python please.

Answers

I have attached pictures.

Hope this helps!

a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I know answer I want how is it the answer

Answers

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

how should tools be stored

Answers

You should store tools in a storage or tool box

How would our lives be different without computers at home?

Answers

Answer:

It would be so difficult to spend a life without computers. We would not be aware of technology or what things are being discovered. We could get information by newspaper, television, radio or some other medium but on computers.

Explanation:

Thanks for the points have a good day <3

Navigation buttons found on Web sites that might lead you to information about the Web site publishers are often labeled _____.


Shop

Index

What’s New

About Us

Answers

About us because what’s new would be about things that are new, index would be about a statistical measure, and shop would be to shop.

Which programming language uses objects?
a. C++
b. ALGOL
c. Pascal
d. BASIC

Answers

So this is your answer hope this helps you
C++

C++, it's also used as code for video games, so it would make sense.

Which of the following bit value represent -5 in two's complement notation?
10000101
11111010
00000101
11111011

Answers

Answer:

11111011

Explanation:

What is pseudo code?

Answers

Answer:

a notation resembling a simplified programming language, used in program design.

Explanation:

Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

How does password encryption primarily protect a presentation?
O It prevents other users from saving the presentation.
O It restricts other users from opening the presentation.
O It restricts other users from emailing the presentation.
O It prevents other users from copyrighting the presentation.

The answer is B.) It restricts other users from opening the presentation.

Answers

if you have the answer why...

Answer: B: It restricts other users from opening the presentation.

Explanation: I just got it right

Other Questions
A company currently using an inspection process in its material receiving department is trying to install an overall cost reduction program. One possible reduction is the elimination of one inspection position. This position test material has a defective content on the average of 0.04. By inspecting all items, the inspector is able to remove all defects. The inspector can inspect 50 units per hour. The hourly rate including fringe benefits for this position is $9. If the inspection position is eliminated, defects will go into product assembly and will have to be replaced later at a cost of $10 each when they are detected in final product testing.Required:a. If the inspector position is eliminated, what will the hourly cost of defects be?b. Should this inspection position be eliminated?c. What is the cost to inspect each unit?d. Is there benefit (or loss) from the current inspection process? How much? Which number line shows the solution of -3x+6>12? What does -2 - 10 equal to? Which statement best summarizes the success of Reconstruction inSouth Carolina in creating educational opportunities for AfricanAmericans?A. South Carolina schools were fully integrated, allowing AfricanAmericans greater educational opportunity.B. A number of colleges and universities were created in SouthCarolina specifically for African Americans.C. African Americans in South Carolina were granted funds to createa public school system for freedmen.D. The Freedmen's Bureau created many schools, educating AfricanAmericans of all ages in South Carolina. In the figure, BC is a support for the roofof a garage. What is the length of BC? I will give brainliest. Please help fast! (Solve for number 5) Help me in number 10 please 6 points!!!! Which of the following are reasons that Mendel used pea plants in his genetic experiments?Select all that apply.A Peas were the only thing available at the monastery.B Pea plants grow fast.C Pea plants are easy to grow.D Pea plants have several distinct traits that vary. Two airplanes leave an airport at the same time on different runways. One flies on a bearing of N 66W at 325 miles per hour. The other airplane flies on a bearing of S 26W at 300 miles per hour. How far apart will the airplanes be after two hours Graph y + 2 = -1(x + 3). Answer the eqation 6h=-24 In the jone school library,10/20 of the computers have scanners.in simplest form, which fraction of the computers have scanners? 1/2 1/4 5/10 6/12 Explain how the plague was spread to Europe and the symptoms associated with the plague. The electron configuration of an element is 1s22s2. How many valence electrons does the element have? (1 point) a 1 b 2 c 3 d 4 Hii..Plzz answer..Note the relationship between the first two words and suggest the suitable word(s) for the fourth place.Ques. - Axons : Nerve :: Cytons : ....... Among a group of disabled women aged 65 and older who were tracked for several years, those who had a vitamin B12 deficiency were twice as likely to suffer severe depression as those who did not. (American Journal of Psychology 157 [2000]:715)a)Explain why this is an observational study and not an experiment.b)Who were the subjects of the study What was Soldier's role during Ancient China? Whats the right answer ? similarties and differences between the three fungi divisions Why is it important to know gas properties at STP?