1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
4 years ago
13

When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user

settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second?
[Check all that apply]

a. Check the C:\User\Belinda Lim\Documents folder.
b. Check the C:\Users\Belinda Lim\Documents folder.
c. Use the chkdsk command.
d. Use the sfc command.
Computers and Technology
1 answer:
SashulF [63]4 years ago
5 0

Answer:

The answer is "option b and c".

Explanation:

  • We know that all the program or task that is performed in the computer is stored in the computer memory that is available in the internal part that is C disk.
  • To check this user profile we first open the Command Prompt then we write that command "C:\Users\Belinda Lim\Documents folder" that checks the folder and to resolve this problem we use "chkdsk command".
  • The full form of chkdsk command is "check disk".This command checks a particular disc and, when necessary, repairs or recovers data on the disk. This command also points as "bad" any broken or defective areas on the disk and retrieves any information that is still unharmed.

You might be interested in
The __________ contains the basic elements of a user's program and can be generated directly from a compiled object file
icang [17]

Answer:

costumes

Explanation:

it will make a good impression and will make sure to get the same thing as you can see

3 0
2 years ago
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
A = 250; B = 325. which of the following statements is true? A ==B A&gt;B A =B
Ivanshal [37]

Answer:

lollol

Explanation:

7 0
3 years ago
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
I am currently building my own PC is there any part I should put first? Or is it just whatever?
Dominik [7]

Basically, I had the same question when I got my PC! You can do any part you choose as long as you put it together in the right place.

Hope this helped you!

4 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    7·1 answer
  • Which examples demonstrate appropriate use of media for a school project? Check all that apply. showing cartoons to teach about
    6·2 answers
  • A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us
    9·1 answer
  • The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
    9·1 answer
  • Write a pseudocode algorithm which asks the user to enter a password.if the user enters “NotAtHome” then print “welcome”
    15·1 answer
  • What happens in the process represented by the flowchart ?
    14·1 answer
  • The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
    10·1 answer
  • Logistic Regression is a type of __________ problem.
    13·2 answers
  • 7.3.4: Find the Error
    7·1 answer
  • A Social agency hires Accenture to improve training and experiences for caseworkers. What is one way Accenture can use Virtual R
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!