1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
13

When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user

settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second?
[Check all that apply]

a. Check the C:\User\Belinda Lim\Documents folder.
b. Check the C:\Users\Belinda Lim\Documents folder.
c. Use the chkdsk command.
d. Use the sfc command.
Computers and Technology
1 answer:
SashulF [63]3 years ago
5 0

Answer:

The answer is "option b and c".

Explanation:

  • We know that all the program or task that is performed in the computer is stored in the computer memory that is available in the internal part that is C disk.
  • To check this user profile we first open the Command Prompt then we write that command "C:\Users\Belinda Lim\Documents folder" that checks the folder and to resolve this problem we use "chkdsk command".
  • The full form of chkdsk command is "check disk".This command checks a particular disc and, when necessary, repairs or recovers data on the disk. This command also points as "bad" any broken or defective areas on the disk and retrieves any information that is still unharmed.

You might be interested in
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
What does the word complacency mean ?
bulgar [2K]

Answer:

a feeling of smug or uncritical satisfaction with oneself or one's achievements.

Explanation:

8 0
3 years ago
Read 2 more answers
Which examples are credible sources that could be used for an essay on the environment? Pick all that apply.
ahrayia [7]

Answer:

article, website run by non profit, website for fed agency

8 0
3 years ago
This project was used to drive the VR Robot to number 25 on the Number Grid
Ludmilka [50]

Answer:

B Wait until position y in millimeter should be greater than 500 at least im guessing because you didnt add what the map looked like, making my job MUCH harder

Explanation:

3 0
3 years ago
The Java Math class is a collection of static methods, one of which is sqrt(number). It accepts a numeric argument and returns t
Sveta_85 [38]

In Java, you would simply type:

Math.sqrt(25);

To print the square root of 25 to the console, you would type:

System.out.println(Math.sqrt(25));

I hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • _____ assures the interface will act as the users expect, while _____ assures it will look pleasing. Select one:
    14·1 answer
  • When a formula contains the address of a cell, it is called a(n)
    9·1 answer
  • Where is the BIOS chip located?
    6·2 answers
  • Typically, you need to score _____ or higher on an AP exam to receive college credit for the AP course in the subject tested by
    11·2 answers
  • Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
    8·1 answer
  • To mitigate the effects of most of the common network threats including disruption, destruction and disaster, companies are begi
    11·1 answer
  • Explain what middleware is. Name a common middleware in two-tier client/server architecture for database applications.
    10·1 answer
  • What is an "immediate preemptive scheduler"?
    15·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!