1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
4 years ago
8

Windows is displaying an error about incompatible hardware. You enter BIOS/UEFI setup to change the boot priority order so that

you can boot from the Windows setup DVD to troubleshoot the system. However, when you get to the Boot screen, you find that the options to change the boot priority order are grayed out and not available. What is most likely the problem?a. You signed in to BIOS/UEFI with the user power-on password rather than the supervisor power-on password.
b. A corrupted Windows installation does not allow you to make changes in BIOS/UEFI setup.
c. Motherboard components are malfunctioning and will not allow you to change BIOS/UEFI options.
d. The keyboard and mouse are not working.
Computers and Technology
1 answer:
Irina18 [472]4 years ago
4 0

Answer:

A

Explanation:

The most likely cause of the problem is that You signed in to BIOS/UEFI with the user power-on password rather than the supervisor power-on password. The User password only enables the machine to boot while the supervisor password allows entering the BIOS settings.

You might be interested in
Question very important cause after my school is over at 5 'oclock I will be playing rocket league if anyone wants to play just
jarptica [38.1K]

Answer:

So can u tell me wut is ur question...It is not understandable

6 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
Which of the following emerging technologies uses the principle of chromosomes to identify suspects?
Slav-nsk [51]

Answer:

b

Explanation:

they say this on the quiz but because of the irrationality DNA has

4 0
3 years ago
Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
fiasKO [112]
I think the answer would be A
5 0
3 years ago
The type of manager that services all requests for data is known as?
3241004551 [841]
The type of manager that services all requests for data is known as IT service management (ITSM)
8 0
3 years ago
Other questions:
  • How to create a delete button in Python?
    15·1 answer
  • When you use the Bing Image Search for online pictures, you will be searching the Internet for pictures that have been filtered
    13·2 answers
  • Excel has more than 400 additional functions that perform just about every type of calculation you can imagine. Answer
    6·1 answer
  • In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
    15·1 answer
  • Making an analogy between Freudian theory and the brain networks described in an earlier chapter in the text, primary process th
    10·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • Emails, Documents, Videos and Audios are examples of- (a) Structured data (b) Unstructured data (c) Semi-structured data (d) Non
    10·1 answer
  • 17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursi
    10·1 answer
  • What is table,form,query and report ?short ans​
    13·1 answer
  • Consider a k=8 block cipher.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!