1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
15

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes a

nd you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first?
Computers and Technology
1 answer:
Yanka [14]3 years ago
5 0

Answer:

Boot to safe mode

Explanation:

When a virus attacks boot system, that is to say, Windows program won´t load. The following steps should be considered taking into account what Windows Version is being used, Windows 7, 8 or 10:

1. Press  F8 (Windows 7) F4 (Windows 8, 10)

2. Enable Safe Mode

3. Run Safe Mode

4. Once in safe mode the user will have access to Windows and eventually document files can be extracted via pendrive.

You might be interested in
An ironworker standing 30 feet in the air is safe wearing a full body harness that is not tied off
Nataly_w [17]

Answer

It is FALSE .

Explanation

A full body harness is a  type of safety 'attire' specifically put on for the purposes of protection. Safety harness are necessarily for fall protection. It also provides the user or the worker comfortability and confidence while working on those high risky places. It is advisable that when a worker is exposed to a fall hazard which about six feet and above high to wear a harness that is tied off.

8 0
3 years ago
Read 2 more answers
What do you think about net neutrality??
Tomtit [17]
I think net neutrality should be kept! Removing net neutrality is unfair for all those who use the Internet! I think life would change is net neutrality did. Certain websites (a lot!) would slow down and cause a lot of people inconvenience, and I bet we'd have to pay more to use some sites!!!

NET NEUTRALITY SHOULD BE PRESERVED!!!!
6 0
3 years ago
Read 2 more answers
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Reed Hastings created Netflix. His inspiration came from the fact that he had to pay a sizeable late fee for returning a DVD bey
noname [10]

Answer:

Which statement accurately describes his key to success?

Explanation:

The success in Netflix lies in offering:

1. Entertainment;

2. fun;

3. originality;

4. innovation and

5. happiness.

Netflix learning is:

1. Bet on your content.

2. Brand Personality.

3. Visual universe.

4. Customization

5. Big Data helps Netflix continue to grow and improve customer service.

3 0
3 years ago
How a student can use computer to improve academic performance?
nikdorinn [45]

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • 1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
    9·1 answer
  • If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    7·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • I wanna start answering questions for people, but I don't quite know how. Can you help me?​
    13·1 answer
  • Which option in Outlook allows a user to look at multiple calendars in a side-by-side fashion?
    14·2 answers
  • What can you do to help create a safe online environment?
    8·2 answers
  • What should you do if your computer is running slower
    12·1 answer
  • [2]<br> (c) Describe how the microprocessor can determine when to sound the clock alarm.
    6·1 answer
  • Fiona was talking to her colleagues about how advancements in digital technology had a negative effect on her life. Which aspect
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!