1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
4 years ago
13

When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user

settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second?
[Check all that apply]

a. Check the C:\User\Belinda Lim\Documents folder.
b. Check the C:\Users\Belinda Lim\Documents folder.
c. Use the chkdsk command.
d. Use the sfc command.
Computers and Technology
1 answer:
SashulF [63]4 years ago
5 0

Answer:

The answer is "option b and c".

Explanation:

  • We know that all the program or task that is performed in the computer is stored in the computer memory that is available in the internal part that is C disk.
  • To check this user profile we first open the Command Prompt then we write that command "C:\Users\Belinda Lim\Documents folder" that checks the folder and to resolve this problem we use "chkdsk command".
  • The full form of chkdsk command is "check disk".This command checks a particular disc and, when necessary, repairs or recovers data on the disk. This command also points as "bad" any broken or defective areas on the disk and retrieves any information that is still unharmed.

You might be interested in
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
Finally, Su uses the last slide of her presentation as a summary slide. She wants to make sure the text she types automatically
Alex777 [14]

Answer:

Format Shape pane

Text Options

Shrink text on overflow

Explanation:

6 0
4 years ago
Read 2 more answers
Is Flip book drawings, frame by frame (need great drawing skills).
lyudmila [28]
I would say traditional animation
7 0
3 years ago
Write a structure declaration to hold the following data about a savings account: Account Number (string object) Account Balance
Citrus2011 [14]

Answer:

Explanation:

The following is written in C and creates a structure declaration named savingsAccount and adds all of the values into it as defined in the question.

struct savingsAccount {

char AccountNumber[] = "";

double AccountBalance;

double InterestRate;

double AverageMonthlyBalance;

}

4 0
3 years ago
In animation what is exaggerated to make the characters more intensely what they are​
aleksklad [387]

Answer:

Exaggerated used of the technique can produce a comical effect, while more realistic animation must time the actions exactly to produce a convincing result. Slow in and slow out. Adds more frames near the beginning and near the end of a movement, and fewer in the middle, to make the animation appear more realistic.

5 0
3 years ago
Other questions:
  • When you include a word cover page in a multi page document, the cover page is not considered the first page. True or false?
    13·1 answer
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    9·1 answer
  • Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
    7·1 answer
  • Use the _______ to add a line or circle to your presentation.
    8·1 answer
  • The parts of a memo are _____.
    9·2 answers
  • ____________________________ and _________________________ are 2 negative impacts of the internet on businesses.
    8·1 answer
  • Please help me with this coding problem :)
    6·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
  • Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!