1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
14

What did do you do if you made a mistake on a computer?

Computers and Technology
2 answers:
Andrej [43]3 years ago
5 0
Get ADW cleaner, and ccleaner. It will work on almost any bug. It basicley wipes out cache (ccleaner), and cleans ad ware off your device (ADW). If it is something else email, a snap shot of your problem. My email is, [email protected] Rate me crown me thank me. If it really helped, crown me. If it helped, thank me. Rate me, and comment.
forsale [732]3 years ago
5 0
The answer to your question truly depends on the mistake you made. If you told me more of what the problem was I could help. =)
You might be interested in
my headphone jack that is like in the computer will not work only my speakers will work when i plug in
marusya05 [52]

I'm assuming that what you are saying is that while the headphone is plugged in to the computer, it still plays on the computer speakers.

Most likely, the headphone outlet is dirty and need cleaning. To solve this, plug in your headphones into the headphone outlet, and take it out really quickly. Do this for a certain amount of time until it works.

If this does not work, check the settings if you are allowing it to play into external devices or not.

~

3 0
3 years ago
Read 2 more answers
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be sto
AURORKA [14]

Answer:

Check the explanation

Explanation:

An entity can be a person, place, thing, or even an event about which data is collated and stored. Entities names usually are nouns.

The Entity Data Model (EDM) is an extensive model of the Entity-Relationship model which identifies the conceptual model of the data using a variety of modeling technique. It acan also be termed as a set of concepts that illustrates data structure, regardless of its stored form.

The Information stored or can be stored in a CASE repository regarding an entity includes:

Name

Definition

Special Notes

7 0
3 years ago
Main function of Ubuntu
Lynna [10]

Answer:

Ubuntu includes thousands of pieces of software, starting with the Linux kernel version 5.4 and GNOME 3.28, and covering every standard desktop application from word processing and spreadsheet applications to internet access applications, web server software, email software, programming languages and tools

Explanation:

5 0
3 years ago
Read 2 more answers
PLEASE HELP!
Gnom [1K]

Answer:

A. True or false

1.True

2.false

3.false

4.true

5.true

4 0
2 years ago
Read 2 more answers
Other questions:
  • A company wants to build a webpage that displays KPIs that can be derived from values in datasets stored in Einstein Analytics.
    6·1 answer
  • How do i connect wifi direct from pc to phone​
    15·1 answer
  • What does the e in email stand for
    8·2 answers
  • Which type of development metrics does Instagram most improve when it releases an update in the App Store to fix errors its cust
    15·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • How Do I Make A Walk animation for a school Project?? Gifs?
    13·1 answer
  • Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals
    7·1 answer
  • Write a program in which you input three numbers they canhave decimals so float values and the program gives you the minvalue ou
    8·1 answer
  • Задание: Построить иерархию классов в соответствии с вариантом задания. Построить диаграммы классов.
    8·1 answer
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!