1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
4 years ago
10

How to delete a virus that act by restarting u r computer? I am in safe mood to aviod restart.

Computers and Technology
1 answer:
kifflom [539]4 years ago
5 0
You have to run your virus and malware scans while in safe mode.
You might be interested in
E lvl:
Alexxandr [17]
I’m cool here here here pizza
5 0
3 years ago
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud
fgiga [73]

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

8 0
3 years ago
The Zoom slider will allow users to _____.
NeX [460]
The Zoom slider will allow users to change the way the document appears on the screen
3 0
3 years ago
Read 2 more answers
You can apply only one of these at a time: underline, bold, or italics. A. True B. False
Pie
The answer would be false you can do more than one at a time

6 0
3 years ago
Read 2 more answers
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
3 years ago
Other questions:
  • Given the following code fragment, how many times does the loop body execute? int laps = 50; int myNum = 1; do { myNum = myNum +
    9·1 answer
  • A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time.
    9·2 answers
  • _______ allows you to add formatting such as shapes and colors to text.
    14·1 answer
  • Which function in spreadsheet software can be used to predict future sales or inventory needs?
    5·2 answers
  • How do you distinguish between misrepresentation and embellishment of one’s professional accomplishments on a résumé? Provide an
    14·1 answer
  • Cite an early photographic pioneer or invention. Explain their/its impact on photography as we know it today.
    14·1 answer
  • Importance of using information and communication technology in personal life
    15·1 answer
  • Follow me on insta Aaftabkhan_7​
    13·2 answers
  • Please help it’s timed
    5·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!