1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
6

When starting a computer running Windows Vista, a technician sees that the error message "BOOTMGR is missing" appears after the

POST. What are two possible solutions for this problem? (Choose two.)a. Restore boot.ini from the installation media.b. Restore BOOTMGR using the Windows Recovery Environment.c. Run the bootrec /fixboot command.d. Run virus removal software.e. Secure the display adapter on the motherboard.f. Run chkdsk /F /R from the recovery console.
Computers and Technology
1 answer:
docker41 [41]3 years ago
8 0

Answer:

B and C

Explanation:

Possible solution to solving "BOOTMGR is missing" error in Windows Vista is to use the Windows Recovery Environment.

Another option is to run "bootrec/fixboot" command from the comman prompt and the command prompt is also accessible from the windows recovery environment.

You might be interested in
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
4 years ago
Which of the following statements is not true about the TCP opening and closing of connections?
lubasha [3.4K]

Answer:  c.)

Explanation:

The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.

It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".

The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.

If one process set the FIN bit to "1", this means that it has no more data to send.

3 0
4 years ago
A computer needs both hardware and to be useful
riadik2000 [5.3K]

Answer:

Software? or a person?

5 0
3 years ago
Read 2 more answers
Tony is in charge of all presentations for a Fortune 500 pharmaceutical company. In addition to creating powerful and persuasive
Ludmilka [50]

Tony uses the Document Inspector dialog box to <u>remove confidential company information</u> from the presentation.

Explanation:

Document Inspector dialogue box has come as boon to the presentation and office document makers. This saves them from any discrepancies’ regarding revealing any sensitive information, unwanted information, hidden data’s etc.

These information’s if released can be a matter of concern for the employee as well as an organisation. Document inspector prevents an employee from later embarrassment and any legal troubles arising out of his actions.

Hence, Tony who is in charge of Fortune 500 pharma company decided to use Document Inspector dialogue box to make sure that his presentation his complete in all aspects of professionalism and is bereft of any sensitive and unwarranted information.  

5 0
3 years ago
Other questions:
  • What is a search engine and how is it different from a browser?
    6·1 answer
  • A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100; Course IS​ 101,
    15·1 answer
  • A data mart differs from a data warehouse in that: Group of answer choices it deals with a particular component or functional ar
    13·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    11·1 answer
  • How and why do engineers use models?
    15·1 answer
  • Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or
    7·1 answer
  • Write a program in Python to sum to numbers:<br><br> Urgently needed, please.
    14·1 answer
  • 25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
    5·2 answers
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
  • Television, the internet, and smartphones are different communication _______blank hsn uses in its imc.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!