1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
patriot [66]
3 years ago
9

A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes

and you see the blue screen of death. You have extremely important document files on the drive that you cannot afford to lose. What do you do first? Explain your answer.
Computers and Technology
2 answers:
Alexxandr [17]3 years ago
7 0

Answer:

Drop the computer case hard drive and mount hard drive it onto another computer device.

Explanation:

A virus is a malicious program that main to damages the computer system The virus will damage the hard drive and we will lose the important data which is stored on that computer.  

when the virus has infected the hard drive and when you starting the Windows, the machine is freezes and the death screen in blue is showing in this case we have to drop the hard drive in the computer and installing the hard drive into the other computer by applying this we will not loose the data that is stored in that hard drive

vitfil [10]3 years ago
4 0

Answer:

The user needs to remove the hard drive and put the hard drive onto the other computer which have already any operating system and antivirus also.

Explanation:

  • This gives the facility to extract the information on the other computer.
  • Then the user needs to extract the information and files into some hard drive after scanned the files.
  • Then the user needs to format the hard drive of the first computer and install the other operating system on it.
  • Then the user needs to put any antivirus on his first computer.
  • Then the user needs to put the file on the first computer

The above-described steps need to taken for that user if he has the scenario which the above question said. The first steps are to remove the hard drive because the user can not able to read or scan files on that computer so there is a need to transfer the hard disk on the other computer to read and scan files.

You might be interested in
What is the importance of Mathematical Modeling in the field of bioinformatics.
Paraphin [41]

Answer: mathematical modelling helps to look into the uncertainties in the calculations based on the observational data.

Explanation:

In bioinformatics for example in gene data expression there can millions of data obtained through various observatory experiments. however most of the data is inadequate to arrive at at a conclusion. So in order to solve this issue we have to apply mathematical modelling to consider those data which would help us to understand the models behavior and access its performance.

6 0
2 years ago
This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. a. Scrip
icang [17]

Answer:b)Cookie

Explanation: Cookies are the files which are of small size for keeping the track of the browsing data in a particular computer system.These files get stored automatically on the system.It has the accessibility through the web server and the computer system's client.

Other given options are incorrect because they don't store the modest websites that has been accessed by the user in the recent time.Thus , the correct option is option(b).

5 0
3 years ago
You '' friend or ''like'' a page o your favorite social media page that advertises a
Naddik [55]

Answer:

The correct answer for the given question is " yes".

Explanation:

In the above question the correct answer is yes because, in any social media site. If we like any web page.it will shows the name of person that like the web  pages .

For example: if we login in any social side  we will see various images,video and story etc.if any  user like all.  it will show the person name that is liked by them.

So the correct answer for this question is yes.

5 0
3 years ago
Can you explain the difference between software and hardware? Tell me 3 examples of each one.
solniwko [45]

Answer:

Hardware like a CPU computes the things like a painting software but the painting software is just a platform to draw things as it doesn't have any purpose without the hardware as it can't be ran. A GPU is a gaming processing unit to process the 3D Environment or a 2D Game Or to render 3d objects.

Explanation:

5 0
2 years ago
what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
svlad2 [7]

Since the hypervisor, a component of virtualization, is in charge of managing all physical memory, it can make any memory pages left over in each guest virtual machine available to other virtual machines or the host computer.

<h3>What Exactly Is A Hypervisor?</h3>

A hypervisor is a class of computer software, firmware, or hardware that builds and manages virtual machines (also known as a virtual machine monitor, VMM, or virtualizer). A host machine is a computer on which a hypervisor is running one or more virtual machines, and a guest machine is a specific virtual machine. The hypervisor controls how the guest operating systems are executed and provides them with a virtual operating environment. The visitor often uses the native hardware to carry out instructions, unlike an emulator. The virtualized hardware resources may be shared by several instances of various operating systems. For instance, Linux, Windows, and macOS instances can all operate on a single real x86 computer. Contrastingly, with operating-system-level virtualization, each instance (often referred to as a container) only needs to share a single kernel, while the guest operating systems—such as various Linux distributions using the same kernel—can differ in user space.

To know more about Softwares, visit:

brainly.com/question/1022352

#SPJ4

6 0
1 year ago
Other questions:
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • Briefly describe the client/server model.
    8·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • How do emotions affect purchasing decisions?
    6·1 answer
  • A______ is a graphical representation of numeric data.
    8·1 answer
  • _______ tools enable people to connect and exchange ideas.
    7·2 answers
  • Write a function ngrams(n, tokens) that produces a list of all n-grams of the specified size from the input token list. Each n-g
    6·1 answer
  • How are switches indirectly involved in ARP poisoning?
    6·1 answer
  • Which one is the answer for the question.
    11·1 answer
  • Convert pounds to ounces.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!