1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
patriot [66]
4 years ago
9

A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes

and you see the blue screen of death. You have extremely important document files on the drive that you cannot afford to lose. What do you do first? Explain your answer.
Computers and Technology
2 answers:
Alexxandr [17]4 years ago
7 0

Answer:

Drop the computer case hard drive and mount hard drive it onto another computer device.

Explanation:

A virus is a malicious program that main to damages the computer system The virus will damage the hard drive and we will lose the important data which is stored on that computer.  

when the virus has infected the hard drive and when you starting the Windows, the machine is freezes and the death screen in blue is showing in this case we have to drop the hard drive in the computer and installing the hard drive into the other computer by applying this we will not loose the data that is stored in that hard drive

vitfil [10]4 years ago
4 0

Answer:

The user needs to remove the hard drive and put the hard drive onto the other computer which have already any operating system and antivirus also.

Explanation:

  • This gives the facility to extract the information on the other computer.
  • Then the user needs to extract the information and files into some hard drive after scanned the files.
  • Then the user needs to format the hard drive of the first computer and install the other operating system on it.
  • Then the user needs to put any antivirus on his first computer.
  • Then the user needs to put the file on the first computer

The above-described steps need to taken for that user if he has the scenario which the above question said. The first steps are to remove the hard drive because the user can not able to read or scan files on that computer so there is a need to transfer the hard disk on the other computer to read and scan files.

You might be interested in
What is computer software?​
Lady_Fox [76]

Answer:

Software is a collection of instructions that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.

3 0
2 years ago
Read 2 more answers
The _____ contains a series of sections designed to prepare students for the ACT
Studentka2010 [4]
The answer is aspire test 
3 0
4 years ago
Read 2 more answers
Which source would provide the best way to find valid information about climate change
igor_vitrenko [27]
Primary sources would be best
4 0
2 years ago
Please write a code for below:
Zanzabum

Answer:

int main()  

{  

   int x,y;  

   bool b1, b2;  

   cout<<"enter values of x : ";

   cin>>x;

   cout<<"enter values of y : ";

   cin>>y;

   b1 = y > x; // false  

     

   b2 = x > y; // true  

     

   cout << "b1 is = " << b1 << "\n";  

   cout << "b2 is = " << b2 << "\n";  

     

   if (b2)  

       cout<<endl << "Larger Number" << "\n";  

   else

       cout << "Smaller Number" << "\n";  

         

     

return 0;  

}

8 0
3 years ago
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
2 years ago
Other questions:
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    13·1 answer
  • Which of the following best define grit
    13·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • 20 POINTS AND BRAINLIEST TO CORRECT ANSWER
    15·2 answers
  • PLEASE ANSWER FAST, WILL GIVE BRAINLIEST AND 20 POINTS
    11·2 answers
  • Which of the following is a type of input device?
    5·1 answer
  • You can put ______ on your phone.
    10·1 answer
  • As of 2019, approximately how much of the world population actively access the internet?
    7·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!