1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
15

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes a

nd you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first?
Computers and Technology
1 answer:
Yanka [14]3 years ago
5 0

Answer:

Boot to safe mode

Explanation:

When a virus attacks boot system, that is to say, Windows program won´t load. The following steps should be considered taking into account what Windows Version is being used, Windows 7, 8 or 10:

1. Press  F8 (Windows 7) F4 (Windows 8, 10)

2. Enable Safe Mode

3. Run Safe Mode

4. Once in safe mode the user will have access to Windows and eventually document files can be extracted via pendrive.

You might be interested in
Which of the Arts, A/V Technology, and Communication career cluster pathways are involved with producing a product for an audien
PIT_PIT [208]

I believe the pathways are Audio/Visual Technology and Film, Journalism and Broadcasting and Printing Technology .


5 0
3 years ago
Read 2 more answers
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
2 years ago
Which of the following is a real job title on The interactive media career pathway?
Serhud [2]

Answer:

The right answer is A

Explanation:

Plzzzzzzzzzzzzz give me brainiest

4 0
2 years ago
Read 2 more answers
write an assembly program that uses the output compare function of a timer to toggle an led every second
victus00 [196]

Answer:

...

Explanation:

8 0
2 years ago
Write a program that will ask user to enter your name and count number of character ?
Svet_ta [14]

Answer:

672

Explanation:

because

8 0
3 years ago
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • Name the function in Python that prompts user to enter values as per the data type specified.
    5·1 answer
  • Can you guys help me plz <br> I want c++ code
    12·1 answer
  • A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on use
    11·1 answer
  • Select the correct text in the passage,
    10·1 answer
  • Similarities between drawing toolbar and editing toolbar​
    12·2 answers
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • Anyone down to play gta later i play on ps4?
    15·2 answers
  • Plsss help me plsssssss
    11·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!