1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
11

Help! I turned on my computer and this screen came on out of nowhere, I don't know what to do to fix it.

Computers and Technology
2 answers:
pshichka [43]3 years ago
6 0

Answer:

Your boot device is corrupted

Explanation: Please use startup repair  if you have data on hard drive ,if data is not problem please reinstall os .

babunello [35]3 years ago
4 0

Here are the steps I would do:

Do a "hard" power off. Hold the power key until the screen turns off. Wait 10 seconds. Turn it on. If it still shows the screen... then i'm not sure.

The error is occurring because it has nothing to boot off of. It's probably something wrong with your hardware. The instructions say for you to insert a "boot disk" and press any key.

You might be interested in
End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page wit
Ilia_Sergeevich [38]

Answer:

4. A Web server has been specified.

Explanation:

End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page with the suspect link and find the following HTML code:

To begin an FTP session, click the following link:

FTP Session

The problem is that Web server has been specified.

7 0
3 years ago
View the attached picture
amm1812

A. B)

B. B) 1837 Douglass joins the East Baltimore Improvement Society

C. A) offers effects when moving from one slide to the next.

Hope this helps!!


8 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
3 years ago
What is MS Paint ?<br><img src="https://tex.z-dn.net/?f=%20computer" id="TexFormula1" title=" computer" alt=" computer" align="a
nignag [31]

Answer:

Microsoft Paint, also known as Paint, is a simple program that allows users to create basic graphic art on a computer. Included with every version of Microsoft Windows since its inception. Paint provides basic functionality for drawing and painting in color or black and white, and shaped stencils and cured line tools.

4 0
3 years ago
What is a characteristic of an open software license
Darya [45]

Answer: Something people can change and share. It is usually given the bad name of have a bunch of fake information and bugs. Wikipedia is a good example of an open source website but it is not a program.

Explanation: An open source program is a program where you have free rein to basically do whatever you want to it.

3 0
3 years ago
Other questions:
  • How many rows and columns does ms-excel 2007 have???
    10·1 answer
  • When you write a C# program that stores a value in a variable, you are using temporary storage; the value you store is lost when
    12·1 answer
  • Who would use a CLI? (Command Line Interface)
    9·1 answer
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • . When would one use the analytic application fraud detection?
    12·1 answer
  • What does a page break do?
    13·1 answer
  • Write a SELECT statement that returns three columns: VendorName from Vendors table, DefaultAccount No from Vendors table, Accoun
    10·2 answers
  • Select the examples that best demonstrate likely tasks for Revenue and Taxation workers. Check all that apply. Brenda works for
    11·2 answers
  • Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the w
    7·1 answer
  • What is the official name of an application on a desktop or a laptop?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!