Before loading Windows 10 from a USB flash drive onto a notebook that previously ran Windows 7, the user must ensure that their important data is backed up and saved elsewhere, as the new installation will wipe out all existing files on the notebook.
The user should also check if the notebook meets the minimum system requirements for Windows 10, such as processor speed, RAM, and storage space. Next, the user should make sure that the USB flash drive is inserted into the notebook's USB port before turning it on. They can access the notebook's BIOS or UEFI settings by pressing a specific key (such as F2, F10, or Del) during the boot-up process, and then selecting the USB flash drive as the primary boot device. Once the notebook boots up from the USB flash drive, the user can follow the on-screen instructions to install Windows 10 onto the notebook's hard drive. After the installation is complete, the user should remove the USB flash drive and restart the notebook to begin using Windows 10.
To learn more about USB flash drive :
https://brainly.com/question/27800037
#SPJ11
what are the key features of the point-to-point protocol (ppp)? (choose three) can authenticate devices on both ends of the link. can be used on both synchronous and asynchronous serial links. establishes, manages, and tears down a call. does not carry ip as a payload
C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.
Thus, It was used to re-implement the Unix operating system's kernel. C increasingly gained popularity in the 1980s.
With C compilers available for almost all current computer architectures and operating systems, it has grown to be one of the most popular programming languages.
The imperative procedural language C has a static type system and supports recursion, lexical variable scoping, and structured programming. It was intended to be compiled, with minimal runtime assistance, to offer low-level memory access and language constructs that easily map to machine instructions.
Thus, C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.
Learn more about C, refer to the link:
https://brainly.com/question/30905580
#SPJ4
how do i create a robot
Answer:
with your hands
Explanation:
What can Amber do to make sure no one else can access her document? O Use password protection. O Add editing restrictions. O Use Hidden text. O Mark it as final.
the term "____" means that work activities are done once, then again, and yet again.
The term "repetitive" means that work activities are done once, then again, and yet again.
The term "repetitive" refers to work activities that are performed repeatedly, often on a regular basis. These activities are characterized by a high degree of similarity, with little variation from one iteration to the next. Examples of repetitive work activities include assembly line work, data entry, and machine operation.
Repetitive work can be physically and mentally demanding, and can lead to boredom, monotony, and fatigue. It can also result in physical strain and repetitive stress injuries, such as carpal tunnel syndrome.
Learn more about repetitive activities:https://brainly.com/question/29511535
#SPJ11
If you witness physical bullying and want to help, what should you consider first?
Answer:
confront the bully
Explanation:
If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.
What is physical bullying?Physical bullying is the use of physical actions to intimidate and gain direct control. Physical activity is unwanted by the victim and can cause damage to the body or property. Some common types of violence enacted through physical bullying are hitting, Kicking, Pinching the Damage of property.
Ask them to refuse engaging emotionally. Set boundaries, don't engage with the abusive behavior, set consequences, and stick to them. Walk away if a boundary you set is crossed, or if you feel unsafe, leave. the place for some period. Talk to victim privately by setting a time aside, expressing your concern.
Offer any assistance, an ear to listen when they need it. Getting someone else involved might result in victim, be more open, to recognize the abuse, since including more people to express concern or witnessing the abuse, adds more value to the concern.
Thus, If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.
Learn more about physical bullying on:
brainly.com/question/17505353
#SPJ3
what is pure substance
Answer:
i don't know
Explanation:
I don't understand
A computer system consists uses usernames with 6 symbols, where the allowable symbols are capital letters (A, B, . . ., Z) and digits (0, 1, . . . , 9). Don’t multiply out. Leave your answers in a form like 7! × 53 × 2.
(a) How many usernames are possible if repetition is not allowed?
(b) How many usernames allow repetition and use only letters?
(c) How many usernames are possible if the first three symbols must be different capital letters (i.e., no repeats), the last symbol must be a nonzero digit, and there are no other restrictions on the symbols?
The possible usernames if repetition is not allowed is 36⁶.
The usernames that allow repetition is 26⁶
The usernames possible if the first three symbols must be different is 15,600.
How to find possibilities?(a) There are 36 possible symbols for each of the 6 symbols, so there are 36⁶ possible usernames.
(b) There are 26 possible letters for each of the 6 symbols, so there are 26⁶ possible usernames.
(c) There are 26 possible letters for the first symbol, 25 possible letters for the second symbol, and 24 possible letters for the third symbol. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 = 15,600 possible usernames.
The first three symbols must be different capital letters. There are 26 possible capital letters for the first symbol, 25 possible capital letters for the second symbol, and 24 possible capital letters for the third symbol. So there are 26 × 25 × 24 possible combinations for the first three symbols.
The last symbol must be a nonzero digit. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 possible usernames.
Find out more on computer system here: https://brainly.com/question/30146762
#SPJ4
How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas
The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.
How did Native Americans gain from the long cattle drives?When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.
Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.
There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.
Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.
Learn more about cattle drives from
https://brainly.com/question/16118067
#SPJ1
a Program in Small Basic to Calculate the Area and Perimeter of a Triangle
Here's an example Small Basic program that calculates the area and perimeter of a triangle, given its base and height:
' Enter the base and height of the triangle
base = TextWindow.ReadNumber("Enter the base: ")
height = TextWindow.ReadNumber("Enter the height: ")
' Calculate the area and perimeter of the triangle
area = 0.5 * base * height
perimeter = base + (2 * Math.Sqrt((0.5 * base) ^ 2 + height ^ 2))
' Display the results
TextWindow.WriteLine("Area: " + area)
TextWindow.WriteLine("Perimeter: " + perimeter)
This program first prompts the user to enter the base and height of the triangle using the TextWindow.ReadNumber function. It then uses the formula for the area of a triangle, 0.5 * base * height, to calculate the area, and the formula for the perimeter of a right triangle, base + (2 * sqrt((0.5 * base) ^ 2 + height ^ 2)), to calculate the perimeter.
The Math.Sqrt function is used to calculate the square root of a number.
Finally, the program displays the calculated area and perimeter using the TextWindow.WriteLine function.
Learn more about coding: https://brainly.com/question/30590902
#SPJ4
What type of terminations are found with RG-6 and RG-59 cables? (Choose two.) A) G-type. B) RJ-10. C) F-type. D) BNC.
The types of terminations commonly found with RG-6 and RG-59 cables are:
C) F-type.
D) BNC.
Both RG-6 and RG-59 cables typically use F-type and BNC terminations. The F-type connector is commonly used for cable television (CATV) connections and is compatible with RG-6 and RG-59 cables. It provides a secure and reliable connection for coaxial cables. The BNC (Bayonet Neill-Concelman) connector is also used with RG-6 and RG-59 cables, particularly in applications such as video surveillance and professional audio/video equipment. The BNC connector offers a twist-lock mechanism for quick and secure connections.
Learn more about RG-6 here:
https://brainly.com/question/31915517
#SPJ11
Consider network below, determine the maximum number of cans (io thousands) an hour from east so tioeth Carolina.
The maximum number of cans (in thousands) an hour from east to south Carolina is 48.
To determine the maximum number of cans per hour from east to south Carolina, we will need to first find the maximum flow capacity for the network below:Network Diagram To get the maximum flow capacity, we will apply Ford-Fulkerson algorithm as shown below:Step 1: Start with the source node S and perform a depth-first search to find an augmented path to the sink node T. If no path exists, terminate the algorithm and output the maximum flow capacity. If a path exists, proceed to step 2.Step 2: Calculate the residual capacity for the augmented path found in step 1. This is done by finding the minimum capacity among the edges in the path. Subtract this capacity from the forward edges and add it to the reverse edges. Proceed to step 3.Step 3: Update the flow capacity by adding the residual capacity of the augmented path to the previous flow capacity. Proceed to step 1.To find the maximum flow capacity, we will use the following network flow table:Network Flow TableThe algorithm will run as shown below:Augmented Path (in bold): S-A-B-C-D-T Residual Capacity = 10Maximum Flow Capacity = 10Augmented Path (in bold): S-A-B-C-E-T Residual Capacity = 5Maximum Flow Capacity = 15Augmented Path (in bold): S-F-B-C-E-T Residual Capacity = 7Maximum Flow Capacity = 22Augmented Path (in bold): S-F-B-D-T Residual Capacity = 2Maximum Flow Capacity = 24Augmented Path (in bold): S-F-G-D-T Residual Capacity = 8Maximum Flow Capacity = 32Augmented Path (in bold): S-F-G-C-D-T Residual Capacity = 5Maximum Flow Capacity = 37Augmented Path (in bold): S-F-G-C-E-T Residual Capacity = 5Maximum Flow Capacity = 42Augmented Path (in bold): S-F-A-B-C-E-T Residual Capacity = 3Maximum Flow Capacity = 45Augmented Path (in bold): S-F-A-B-C-D-T Residual Capacity = 1Maximum Flow Capacity = 46Augmented Path (in bold): S-F-A-B-D-T Residual Capacity = 2Maximum Flow Capacity = 48Augmented Path (in bold): S-F-G-C-D-T Residual Capacity = 0Maximum Flow Capacity = 48Therefore, the maximum number of cans (in thousands) an hour from east to south Carolina is 48. Answer: 48.
Learn more about algorithm :
https://brainly.com/question/21172316
#SPJ11
im almost failing computer class✨✨ does anybody know the mistakes in all this code?
Answer:
I think it's the fact that the orange red color isn't a color code OR that's it's one word
Explanation:
what did Bakers wear (1) in the Portugal does (2) when was author was young ???
Please don't post invalid answer please..!!
Anyone active here please give me answer of that question..!!
(i) The dress that the bakers used to wear in Portugal was; a a single-piece long frock that reached to their knees called ''Kabai''.
(ii) The dress that the bakers used to wear when the author was young was; shirts and trousers that were shorter than the ones of full length but longer than half-pants.
This question is from the title "Glimpses of India" which is a story about a baker from Goa that is related to the period/time when the Portuguese were ruling in Goa. The story is simply a chronicles of one of the bakers that was residing in a Goan village.
i) Now, according to his story, it was clear that the cloth that was synonymous with the bakers was a single piece frock that reached their knees and this dress was called "Kabai"ii) When the author was young he reported that the dresses then among the bakers were shirts and trousers that were quite shorter than the ones of full length but longer than the half-pants.Read more on glimpses of india at; https://brainly.com/question/9566788
In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply
There is great improvement in technology. Tom should reply that Containers uses Containers use operating system (OS) components for virtualization.
That is a kind of operating system (OS) virtualization where leverage features is placed on the host operating system so as to separate or isolate processes and control the processes' access to CPUs, memory and desk space.Container based virtualization often makes use of the kernel on the host's operating system to run multiple guest instances. By this, one can run multiple guest instances (containers) and each container will have its specific root file system ascribe to it, process and network stack.
Learn more from
https://brainly.com/question/24865302
What is another term for the notes that a reader can add to text in a word- processing document?
Answer:
Comments
.....
why is it generally not recommended to configure bridgehead servers manually?
Explanation:
Bridgehead servers are the domain controllers that manage the replication of directory data between sites in Active Directory. While it is technically possible to manually configure bridgehead servers, it is generally not recommended to do so because of the complexity involved in ensuring proper replication of directory data.
Manually configuring bridgehead servers can be time-consuming and error-prone, and can lead to issues such as replication delays, data inconsistencies, and even data loss. This is because bridgehead servers need to be carefully configured to ensure that they are communicating properly with other domain controllers and are using the most efficient replication topology.
Instead of manual configuration, it is recommended to use automated tools or procedures to configure bridgehead servers. This can help to ensure that the servers are properly configured and that replication is running smoothly. Additionally, using automated tools can help to save time and reduce the risk of errors in the configuration process.
Overall, while it is possible to manually configure bridgehead servers, it is generally not recommended due to the complexity involved and the potential risks to the integrity of directory data.
What is the difference between semantic segmentation and object detection?
Semantic segmentation and object detection are two computer vision techniques used for image analysis. The difference between them is in the level of granularity of the analysis. In contrast, semantic segmentation divides the image into a grid of predefined classes and can provide more detailed information about the objects in the image.
Semantic segmentation is a process of dividing an image into different segments, with each segment representing a distinct object or region of the image. In other words, it is a pixel-wise classification of an image, where every pixel is assigned a label that describes the object it belongs to.
Object detection, on the other hand, is the process of identifying and localizing specific objects within an image. Object detection algorithms detect the presence of an object in an image and draw a bounding box around it to indicate its location. This allows for multiple objects to be detected in a single image. In summary, while semantic segmentation deals with pixel-wise classification of an image, object detection is focused on detecting and localizing specific objects within an image.
Learn more about semantic segmentation https://brainly.com/question/28454998
#SPJ11
In a certain country, a person must be at least 16 years old to drive a car and must be at least 18 years old to vote. The variable age represents the age of a person as an integer. Which of the following expressions evaluates to true if the person is old enough to drive but not old enough to vote, and evaluates to false otherwise?
I. (age ≥ 16) AND (age ≤ 18)
II. (age ≥ 16) AND (NOT(age ≥ 18))
III. (age < 18) AND (NOT(age < 16))
Answer:
i. (age >= 16) AND (age <= 18)
Explanation:
What the statement means is that it will only be true if the person is older than or 16 and younger than or 18.
That means that if either one is not true, the entire statement won't be either, as it requires both to be true to work.
The other 2 statements use NOT which changes the value. This means that if someone is less than 18, which is supposed to be true, the not statement will change it so that it's not.
I hope this makes sense :)
what is the name of the square in the lower-right corner of a selection that is used to copy cells
The square in the lower-right corner of a selection that is used to copy cells is called the Fill Handle. When you click and drag the Fill Handle, Excel automatically copies the data from the selected cell(s) into adjacent cells in the same column or row. The Fill Handle is a useful tool for quickly copying formulas, values, or formatting across multiple cells.
To use the Fill Handle, first select the cell(s) that contain the data you want to copy. Then, hover your mouse over the lower-right corner of the selection until the cursor changes to a small black cross. Click and drag the Fill Handle in the direction you want to copy the data (down to copy to cells below, or right to copy to cells to the right). When you release the mouse button, Excel will automatically copy the data into the adjacent cells.
In addition to copying data, the Fill Handle can also be used to fill in a series of numbers or dates. For example, if you have a series of dates that you want to fill in, you can select the starting date and then drag the Fill Handle down to fill in the rest of the dates in the series.
Overall, the Fill Handle is a simple but powerful tool that can save you time and effort when working with large sets of data in Excel.
Learn more about excel here:
https://brainly.com/question/30324226
#SPJ11
Is anyone good a photography? If so pls any help would be great! Brainliest will be given:)
Answer:
Based on the image I'd have to say the answer is fast shutter speed
what layout or organizational features (e.g., topic, chapter headers) help you understand an informational text?
With headings at the top and subheadings below, organizational features like headings and subheadings help the reader understand what they're about to read. The font used to indicate headings and subheadings is different from the font used for the rest of the text.
What characteristics distinguish an informational text?A table of contents, an index, bold or italicized text, embedded definitions for specialized vocabulary, realistic illustrations for photos, captions and other labels, graphs, and charts are a few examples of these.
What are the four different features of informational text?Literary nonfiction, expository writing, argumentative writing (also known as persuasive writing), and procedural writing are the four primary categories of informational texts.
To know more about subheadings visit:-
brainly.com/question/12562417
#SPJ4
In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.
Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3
Answer:
python
Explanation:
list_of_numbers = []
count = 0
while count < 6:
added_number = int(input("Enter a number: "))
list_of_numbers.append(added_number)
list_of_numbers.sort()
print(f"Smallest: {list_of_numbers[0]}")
count += 1
FILL IN THE BLANK. the gea group implemented a(n) ___________ to address its reporting issues.
The GEA Group implemented a comprehensive Enterprise Resource Planning (ERP) system to address its reporting issues. An ERP system is a centralized software solution that helps manage various business processes such as accounting, human resources, and inventory management.
The system integrates all the data from different departments and provides a unified view of the business operations, enabling decision-makers to have real-time access to accurate and up-to-date information.
With the implementation of the ERP system, the GEA Group was able to streamline its reporting processes, eliminate redundancies and inconsistencies, and ensure compliance with regulatory requirements. The system also provided the company with a better understanding of its financial and operational performance, allowing it to make data-driven decisions.
The benefits of the ERP system go beyond addressing reporting issues, as it helps companies achieve greater efficiency, cost savings, and improved customer satisfaction. It enables businesses to better manage their resources, reduce waste and improve productivity, which ultimately contributes to their overall success.
You can learn more about ERP systems at: brainly.com/question/30086499
#SPJ11
diffreciate between primary source of information and secondary source of information
Answer:
Primary is firsthand, secondary is viewed through articles and other materials.
Explanation:
EX: Primary account of a story, secondary view through pictures.
* bsttest. Java is the main in zybooks and is used for testing your code. Tree. Java is the interface you will implement in bst. Java. These are named the same as lab 20, but the code is different. Last lab you worked with a binary search tree of integers. Now you will be extending the functionality of the tree to work with any class that implements the comparable interface. As can be seen in oracle's javadoc to when a class implements the comparable interface, it must provide an implementation of the method compareto(). This method compares one object to another to determine if the object is less than, equal to or greater than the other object. The javadoc explains what each of these cases return, but i'll show an arbitrary example in case it comes off as a little confusing. Say we have object x and another object of the same type y. Xpareto(y) returns an integer less than 0 if x < y, returns zero if x
The provided text seems to be incomplete, as it cuts off mid-sentence. However, based on the available information, it appears to be discussing the implementation of a binary search tree (BST) in Java.
The text mentions two Java files: "bsttest.java" and "Tree.java." "bsttest.java" is likely the main class used for testing the code, while "Tree.java" is an interface that needs to be implemented. The goal is to extend the functionality of the tree to work with any class that implements the Comparable interface.
The Comparable interface requires implementing the compareTo() method, which compares objects to determine their order. The method should return an integer less than 0 if the object is less than the compared object, 0 if they are equal, and an integer greater than 0 if the object is greater.
Without the complete information or specific code examples, it is difficult to provide further details or assistance. If you have specific questions or need help with a particular aspect of implementing the binary search tree, please provide more context or code snippets.
To know more about binary search tree (BST), visit:
brainly.com/question/31604741
#SPJ11
Consider the following class and print the output:
abstract class Test1 {
static int x;
Test1() {
System.out.printf("Making objects");
}
public abstract void restful(int x);
}
public class Test2 extends Test1 {
public void restful(int x) {
System.out.printf("class Test2");
}
}
public class Test3 extends Test1 {
Test3()
{
super();
}
public void restful(int x) {
System.out.printf("class Test3");
}
}
public class Driver {
public static void main(String [] args)
{
Test2 a1 = new Test1();
Test3 a2 = new Test();
a1.restful(15);
a2.restful(20);
Test a3 [] = new Test[5];
for(int i=0;i
if (i%2)
a3[i] = new Test2();
else
a3[i] = new Test3();
for(int i=0;i
a3[i].restful[10];
}
}
There are a few errors in the provided code. First, in the main method of the Driver class, the code tries to create an object of the abstract class Test1 using the Test2 constructor. This is not allowed since Test1 is abstract and cannot be instantiated.
Secondly, in the for loop that creates an array of Test objects, the method call to restful() is incorrect. It should be a method call with parentheses instead of square brackets.
Here's the corrected code with the expected output:
abstract class Test1 {
static int x;
Test1() {
System.out.println("Making objects");
}
public abstract void restful(int x);
}
public class Test2 extends Test1 {
public void restful(int x) {
System.out.println("class Test2");
}
}
public class Test3 extends Test1 {
Test3() {
super();
}
public void restful(int x) {
System.out.println("class Test3");
}
}
public class Driver {
public static void main(String[] args) {
Test2 a1 = new Test2();
Test3 a2 = new Test3();
a1.restful(15);
a2.restful(20);
Test1 a3[] = new Test1[5];
for (int i = 0; i < 5; i++) {
if (i % 2 == 0)
a3[i] = new Test2();
else
a3[i] = new Test3();
a3[i].restful(10);
}
}
}
Expected output:
Making objects
Making objects
class Test2
class Test3
Making objects
class Test2
Making objects
class Test3
Making objects
class Test2
Making objects
class Test3
Making objects
Learn more about loop about
https://brainly.com/question/30706582
#SPJ11
Effective nonverbal communication can cause tension.
True or False
Explanation:
When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.
Answer:
False
Explanation:
Using the World Wide Web, search for advice about the following issues. For each issue, search for information on the manufacturer’s web site and at least one third-party resource or forum. Consider how you found the solution for each item, what the solution is, and how the answers differ or do not differ on the manufacturer’s web site and the third-party site. If you cannot find a description or resolution of an error in two different places, explain your process searching for that information on either a third-party site or the manufacturer’s site.
What problem does the OS X Mountain Lion 10.8.2. Supplemental Update 2.0 resolve?
What are the disk space requirements for installing Windows 7 Service Pack 1 from an installation DVD?
List two causes and one solution for a 404 Error.
Define device manager error code 10 and explain how to fix it.
Describe the steps to locate the serial number on an Acer desktop computer.
How do you find out the meaning of beep codes you hear during startup?
What is the first step to take to resolve a blue screen of death error?
What steps should you take if you installed a new device driver and the computer will not start?
Explain the possible causes of a User32.dll Not Found error message.
List the steps for changing the language of your keyboard.
Write a report sharing the detailed information for each of these tasks. You may do so using bullet points or a table. You may use screen shots to illustrate a particular issue or solution. Make sure to include information about:
how you found the solution on the web sites: search, browse, ask a question, etc.;
how you located the manufacturer and/or third-party web sites you used;
the solution or details requested above; and
the difference between the solution or explanation offered by the manufacturer and the third-party website (s).
Submission Requirements
Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, or graphics neat and well organized.
Make the information easy to understand.
Using the World Wide Web, search for advice about the following issues the net browser (generally called a browser) is a software program person agent for getting access to statistics at the World Wide Web.
What are the three search engines like and yahoo that assist you locate statistics from extraordinary websites?There are many extraordinary search engines like and yahoo you may use, however a number of the maximum famous consist of , Yahoo!, and Bing. To carry out a seek, you may want to navigate to a seek engine on your net browser, kind one or greater keywords—additionally called seek terms—then press Enter to your keyboard.
A browser is a laptop software that allows you to apply the laptop to view WWW files and get admission to the Internet taking benefit of textual content formatting, hypertext links, images, sounds, motion, and different features.
Read more about the browser:
https://brainly.com/question/25689052
#SPJ1
Which of the following is NOT true about high-level programming
languages?
Answer:
this can't be answered because you didn't show the "following" answers
Answer:
u did't write the question
then how will we answer u
and people behind brainly don't try to delete my answer
because only if he show the question then only i can answer him
To identify the effect in a text, you can ask yourself which question?
A. What happened?
B. Why did this happen?
C. How did the person feel?
D. Where did this happen?
Answer:
why did this happen?
Explanation:
effect means what caused it so You should ask why did this happen or (what caused it)