1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
11

"what should you do if the system continually reboots and you can't read the error message produced on a blue screen

Computers and Technology
2 answers:
mr_godi [17]3 years ago
4 0
I am fairly sure the command for boot options is F11, and if not, then power down the system manually and turn it back on
Romashka-Z-Leto [24]3 years ago
3 0
Press f8 as windows starts up
You might be interested in
What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjet
ivanzaharov [21]

Answer:

The answer is "Option A".

Explanation:

The Dot matrix printer is also known as an impact matrix printer. It is a multi-part form printer because it prints data on paper. This printer uses a hammer and a ribbon printer, that shapes pictures from dots. and other options are not correct, that can be described as follows:

  • In option B, daisy-wheel printer prints data on printer only one side that's it is not correct.
  • In option C, the Inkjet printer is capable to print data in multi-part forms, but this printer does not data in continuous forms.
  • In option D, the color printer allows you to print data in color format like images, graphs, and banner. It prints data only on one side, that's why it is not correct.  
6 0
2 years ago
It is important for security practitioners to take into consideration the __________ element when devising password security pol
N76 [4]

Answer:

The answer is "Evidence".

Explanation:

A "practitioner" is a person that has a specific practice or specialty directly involved. A safety professional of data is indeed another who engages in the protection of data.

Evidence is used in the course of the investigation to show certain material information or characteristics of a felony. Most people seem to believe that proof is just tangible, verbal evidence.

4 0
3 years ago
What types of activities are ideal for a robot to perform?
LUCKY_DIMON [66]

The type of activities that are ideal for a robot to perform are; Repetitive tasks

Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.

Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.

The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.

Read more about robots at; brainly.com/question/9145476

3 0
2 years ago
Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
KATRIN_1 [288]

Answer:

Redundancy

Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1

Conflict and understandability

Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.

Completeness

Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?

Either remove mainly or clarify other print out.

What version of html or web browser is assumed in Req. 1 and Req. 3?

Explanation:

5 0
3 years ago
When pointed over a text within a paragraph, the cursor takes the shape of a/an
Crank
I type of shape, or a pointing index finger
5 0
3 years ago
Other questions:
  • ) The ________ displays a text box and button for users to browse, select, and upload a file. (Points : 3)
    13·1 answer
  • Help plz
    5·1 answer
  • A firewall is either software or dedicated hardware that exists between the __________ being protected.
    13·1 answer
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    8·2 answers
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
    13·1 answer
  • What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________
    13·1 answer
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    12·1 answer
  • An epic games service is unavailable at the moment
    8·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!