1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
13

When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user

settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second?
[Check all that apply]

a. Check the C:\User\Belinda Lim\Documents folder.
b. Check the C:\Users\Belinda Lim\Documents folder.
c. Use the chkdsk command.
d. Use the sfc command.
Computers and Technology
1 answer:
SashulF [63]3 years ago
5 0

Answer:

The answer is "option b and c".

Explanation:

  • We know that all the program or task that is performed in the computer is stored in the computer memory that is available in the internal part that is C disk.
  • To check this user profile we first open the Command Prompt then we write that command "C:\Users\Belinda Lim\Documents folder" that checks the folder and to resolve this problem we use "chkdsk command".
  • The full form of chkdsk command is "check disk".This command checks a particular disc and, when necessary, repairs or recovers data on the disk. This command also points as "bad" any broken or defective areas on the disk and retrieves any information that is still unharmed.

You might be interested in
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
2 years ago
Change the quick style gallery display
OverLord2011 [107]

Answer:

wdym?

Explanation:

5 0
2 years ago
Where do you place the logical test argument in an IF function formula?
Inessa [10]

Answer:

The first argument listed after IF

Explanation:

When the two variables are listed next to each other, Excel will find and calculate the correlation between them.

8 0
3 years ago
Read 2 more answers
17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursi
Yuliya22 [10]

Answer:

The recursion function is as follows:

def raise_to_power(num, power):

if power == 0:

 return 1

elif power == 1:

 return num

else:

 return (num*raise_to_power(num, power-1))

Explanation:

This defines the function

def raise_to_power(num, power):

If power is 0, this returns 1

if power == 0:

 return 1

If power is 1, this returns num

elif power == 1:

 return num

If otherwise, it calculates the power recursively

else:

 return (num*raise_to_power(num, power-1))

6 0
2 years ago
What are some ways you can use the Effect Options dialog box to customize animations in a presentation? Check all
aliina [53]
The first and the 3 ones
4 0
2 years ago
Read 2 more answers
Other questions:
  • Assume that isIsosceles is a bool variable, and that the variables isoCount, triangleCount, and polygonCount have all been decla
    11·1 answer
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for wr
    11·2 answers
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • What is the difference between an activity inventory and an object inventory?
    8·1 answer
  • Need help asap please​
    13·1 answer
  • To find information on a network use a ____
    14·1 answer
  • The variable points stores data that the user has input. what is the data type of this variable?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!