1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
4 years ago
14

Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did no

t back up his data and has numerous important files on his hard drive. During your investigation, Landon tells you he was watching a movie on his computer the previous night. What might be the problem with Landon’s computer?
Computers and Technology
2 answers:
amm18124 years ago
4 0

We will be taking a lot of assumptions in this question. Assuming that Landan did not accidentally drop his laptop, as a technician, what I would want to check first is the BIOS settings. There are a couple of issues that can cause this error. These issues may include a boot sector virus that erased the whole hard drive, a bad windows installation, or even a loose cable. Before I check on the BIOS settings, I would request him to unplug any external hard disks. He might have been watching his movies from the hard disk and the disk being connected might be the one causing the error. A wrong boot order in the BIOS settings may be giving priority to another boot source disk like the external hard disk mentioned. I should be able to take Landan through steps that he needs to take to make his hard disk priority. I would also check for corrupt sectors by running the inbuilt CHKDSK tool. If these options don’t work, I would consider checking the hardware itself for further diagnostics.

Lerok [7]4 years ago
3 0

Hard drive might not be detected due to various reasons. Some problem can be fixed only by the hardware engineer or technical person, few other can be fixed by self by “troubleshooting”. The possible reason could be, BIOS might not have switched on the hard drive so it has not detected. Sometimes data cable might be unplugged.

So you can try replacing one another cable. Another possible reason could be virus. Virus might have corrupted all the data in the hard drive. So anti-virus can be installed to rectify this.

You might be interested in
Need help this will affect my final grade in technology and the dead line has passed!!!
Setler79 [48]
The four<span> separate </span>strokes<span> are termed: ... While the piston is at T.D.C. </span><span>the compressed air-fuel mixture is ignited by a spark plug (in a </span>gasoline engine) or by heat generated through high compression<span>, forcefully returning the piston to B.D.C.

Hope this helps! : )</span>
6 0
4 years ago
Where do you place the logical test argument in an JF function formula?
balandron [24]

Answer:

the first argument listed after IF

Explanation:

The Logical... argument in an IF function formula is always the first argument listed after IF.  And the second option is the value to be printed if the logical...argument is true, and if it is false then the value mentioned as third argument is assigned, or printed. And the logical...argument never comes before the IF function formula. Hence, the right option is the first argument.

7 0
4 years ago
Read 2 more answers
How do I change the selected cell to 20 pt
sergij07 [2.7K]
Its right next to pick a subject, the column. <span />
6 0
4 years ago
Read 2 more answers
You must. place a child in a federally approved child restraint device. if the child is
abruzzese [7]
You must place a child in a federally approved child restraint device if the child is three years and under. 
5 0
3 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
4 years ago
Other questions:
  • The box plot represents this data set. {16, 16, 16, 18, 18, 20, 24, 28, 30, 34} What value does the letter A represent on the bo
    8·2 answers
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • In C#Write the program SubscriptExceptionTest in which you use an array of 10 doubles. Write a try block in which you place a lo
    5·1 answer
  • A software update is also referred to as what?
    15·2 answers
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • Which statements are true? Select 4 options.
    9·1 answer
  • How do you change your name in the profile section because i am trying to change my name.
    9·2 answers
  • What is cyber security ???​
    8·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!