1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
12

For my windows 7 it is asking my for a product key, in order to get the new version. I found it but it isn't working. The CD Key

they gave me is: BBBBB-BBBBB-BBBBB-BBBBB-BBBBB
Why isn't it working? It's under Windows 7 Professional.
Computers and Technology
1 answer:
olga_2 [115]3 years ago
8 0
So I suggest you call them or watch YouTube because that is not a real CD key I have no clue why they gave you that you might be looking at the wrong thing but try upgrading your computer too.
You might be interested in
What is the difference between concrete language and abstract language? give an example of each.
saul85 [17]

The difference between abstract language and abstract language is that abstract language is known through the intellect and concrete language is known through the senses.

<h3>What are abstract and concrete languages?</h3>

The abstract language uses the words like kind, truth, grace, etc. It is a form of language that indicates the intellectual, but concrete language can be known by the senses.

Thus, the distinction between concrete and abstract language is that concrete language is understood via the senses, whereas abstract language is understood through the mind.

To learn more about abstract and concrete languages, refer to the link:

brainly.com/question/16550006

#SPJ4

7 0
2 years ago
A _____ is a type of legal protection for which person can apply to protect an invention or a discovery.
shepuryov [24]

Answer:

patent

Explanation:

A patent is an intellectual property, with this legal protection, we can exclude to use, sell, and importation of an invention for a limited period of years, but we must do an enabling public disclosure of the invention or discovery, it is a requirement of the patent law, a patent is considered an advantage in the industries world.

3 0
3 years ago
Write a brief explanation of the problems that can occur in each of the following scenarios and what you should do to avoid thes
photoshop1234 [79]
1. Horsing around can lead to breaking equipment in the classroom or somebody getting hurt

2. leaving your backpack on the floor can cause someone to fall

3.something unexpected may happen and worsen the problem

4. it can corrupt the computer's files and deleted unsaved work.

if you want the sentences to be longer, add some words to them and make the message the same.
4 0
4 years ago
What is a deny all catch all
a_sh-v [17]

Answer: The default catch-all rules at the end of  are: block in log quick all label "Default block all just to be sure." block out log quick all label .

Explanation:

7 0
3 years ago
Help please what is the answer , thanks!!!
shepuryov [24]

Answer:

X = "Hello World"

Y = "hello world"

Z = 100

C = 200

if X == Y:

   print("TRUE")

else:

   print("FALSE")

if Z > C:

   print("TRUE")

else:

   print("FALSE")

4 0
3 years ago
Other questions:
  • How do computers perform complicated tasks built from simple instructions?
    14·1 answer
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    8·2 answers
  • Whats my screen name?
    9·2 answers
  • Where is the thesis statement usually located in research paper?
    6·1 answer
  • In Microsoft Word, when you highlight existing text you want to replace, you're in
    7·1 answer
  • What could be a summary sentence or phrase that captures your writing experience?
    11·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • 1. A truck leaves a stop sign and accelerates uniformly over a time of 5.21 seconds for a
    10·1 answer
  • PLEASE HELP!!<br> Would you ever try and get famous off of social media? Why or why not?
    6·2 answers
  • Which of the following is an example of phishing attack? csp
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!