1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
2 years ago
5

Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?

Computers and Technology
2 answers:
rusak2 [61]2 years ago
8 0
Break your laptop and get a new one
snow_lady [41]2 years ago
7 0
Try completely restarting it 1 or 2 times and see if that works first
You might be interested in
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
3 years ago
Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
Shalnov [3]

Answer: Child element

Explanation:

 According to the question, terry building the web site and she wants to create the three main types of links in the home page such as home, contact us and the product information. The, she start creating the hierarchy of elements in the page and also revise all the styles in the sheet.

Then, the home page contain the two child element as it s the sub elements of the home page. As, the one element which is inherited from the upper element ( Parent ) is known as child element. This is the hierarchy of the elements which represented in the home page.  

5 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
ra1l [238]

Answer:

ac be df

Explanation:

7 0
3 years ago
When a device is assigned a global unicast or link-local unicast address, it is recommended that ________________is performed on
olya-2409 [2.1K]

Answer:

DAD (Duplicate Address Detection) is performed on the address to ensure that it is unique.

Explanation:

4 0
3 years ago
Which of the following situtaions demonstrates informatiomal technology used as a primary focus
Studentka2010 [4]

Answer:

well if your spesific then I could tell you

6 0
3 years ago
Other questions:
  • Write a program that estimates the approximate number of times the user’s heart has beat in his/her lifetime using an average he
    12·1 answer
  • when you cross or enter traffic from a full stop, how much space should you allow on city streets? on the highway?
    11·1 answer
  • How do you increase the amount of data in a sampled Google Analytics report?
    8·1 answer
  • Test Average and Grade
    12·1 answer
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • Why do bats sleep upside down
    7·1 answer
  • Create a function called "strip_r_o" that takes in a STRING and strips all the Rs and Os from the string. Also use a FOR loop in
    7·1 answer
  • A menu within a menu is called what?​
    5·1 answer
  • Debugging 2.17.3: Debug: The Two Towers Code Hs
    15·1 answer
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!