1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
2 years ago
11

Help! I turned on my computer and this screen came on out of nowhere, I don't know what to do to fix it.

Computers and Technology
2 answers:
pshichka [43]2 years ago
6 0

Answer:

Your boot device is corrupted

Explanation: Please use startup repair  if you have data on hard drive ,if data is not problem please reinstall os .

babunello [35]2 years ago
4 0

Here are the steps I would do:

Do a "hard" power off. Hold the power key until the screen turns off. Wait 10 seconds. Turn it on. If it still shows the screen... then i'm not sure.

The error is occurring because it has nothing to boot off of. It's probably something wrong with your hardware. The instructions say for you to insert a "boot disk" and press any key.

You might be interested in
Which three major objects are built into the JavaScript language?
Marizza181 [45]

Answer:

jddjjddjdjdjjsjsjejejejjejejejjdjdjeje

3 0
2 years ago
Read 2 more answers
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
serg [7]

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

5 0
2 years ago
What are examples of common computer software problems?
MAXImum [283]

Movie Video Editor, Windows 10, Paint, MS Paint, Word Document, Spreadsheet, Calculator, Email, Hotmail, Google Chrome, Firefox, Internet Explorer, & more. Just some from the top of my head.

8 0
3 years ago
Read 2 more answers
What does network administration normally include? Check all of the boxes that apply.
Paul [167]

Answer: design of the network

security for the network

documentation

identifying and fixing issues

Explanation: I just took the test

8 0
3 years ago
Other questions:
  • Suppose a computer can execute 1 billion instructions/sec and that a system call takes 1000 instructions, including the trap and
    10·1 answer
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Mary needs to choose the menu in order to place the text in a desired fashion around the image.
    14·2 answers
  • A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. what command co
    15·1 answer
  • If a person sends email from a school computer or a business computer, should that message be considered private?
    8·2 answers
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
    10·1 answer
  • Some of y'all make me lose braincells with your questions
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!