1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
2 years ago
13

A customer calls complaining their laptop wont start what should I say

Computers and Technology
1 answer:
topjm [15]2 years ago
4 0

Answer:

tell them to bring there laptop to you so you can explain how to get them out of situations like those. Or maybe do a video call so the person can show you whats going on and you can take it on from there guiding her on how to fix it...

Explanation:

You might be interested in
What are the 2 levels of formatting in a word document
goldfiish [28.3K]

Answer:

Paragraph Styles and character formatting (font, color, etc.)

7 0
2 years ago
What are some direct access devices
bija089 [108]
Like a DVD and stuff like that.
3 0
2 years ago
Which technology concept uses computer resources from multiple locations to solve a common problem?​
umka2103 [35]

Answer:

Distributed memory systems

Distributed memory systems use multiple computers to solve a common problem, with computation distributed among the connected computers (nodes) and using message-passing to communicate between the nodes.

Explanation:

5 0
3 years ago
3. Answer the following in one sentence: (1*6=6 )
Whitepunk [10]

Answer:

A

Explanation:

I did it

7 0
2 years ago
Read 2 more answers
​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and
SCORPION-xisa [38]

Answer:

The correct answer for the following question will be A. Cipher code.

Explanation:

Cipher code:

Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.

Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.

So, option A is a suitable answer.

3 0
3 years ago
Other questions:
  • Personal Web Page Generator Write a program that asks the user for his or her name, then asks the user to enter a sentence that
    11·1 answer
  • write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a
    5·1 answer
  • You have found an old dusty computer in your basement that you can identify as an original IBM PC. You ask your friend if he kno
    13·1 answer
  • 11. John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the follow
    14·1 answer
  • Which of the following documents cannot be created using the Microsoft® Word® application?
    5·2 answers
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • What is the first step a user should take toward generating an index?
    7·1 answer
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • How to execute python code in command prompt *window*?
    5·1 answer
  • Write a report on the effectiveness of using thicker bags. Remember to include the effect on the environment and the economy in
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!