1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
11

I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time

I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.
Computers and Technology
1 answer:
olga_2 [115]3 years ago
5 0

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

You might be interested in
How many possible password of length four to eight symbols can be formed using English alphabets both upper and lower case (A-Z
Fynjy0 [20]

Answer:

In a password, symbol/characters can be repeated. first calculate the total

symbols which can be used in a password.

So there are total 26(A-Z),26(a-z),10(0-9) and 2(_,$) symbols.

that is equal to 26+26+10+2=64.

Total number of password of length 4:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64=16777216

Total number of password of length 5:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64*64=1073741824

Similarly,

Total number of password of length 6:

64*64*64*64*64*64=68719476736

Total number of password of length 7:

64*64*64*64*64*64*64=4398046511104

Total number of password of length 8:

64*64*64*64*64*64*64=281474976710656

Hence the total number of password possible is:285,942,833,217,536

7 0
4 years ago
Need help asap<br> give the correct answer!!
blagie [28]
It’s either b or c, but my final answer would be C
4 0
3 years ago
Read 2 more answers
Is a storyboard an example of an implemation tool?
goblinko [34]
Yes, the answer is true.
8 0
3 years ago
Read 2 more answers
Define the terms data and information ??​
lora16 [44]

Answer:

Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.

5 0
3 years ago
Read 2 more answers
3.What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation
weqwewe [10]

Answer:

speed and storage

Explanation:

The pros and cons of both are mainly in regards to speed and storage. Due to linked lists elements being connected to one another it requires that each previous element be accessed in order to arrive at a specific element. This makes it much slower than an array-based implementation where any element can be quickly accessed easily due to it having a specific location. This brings us to the other aspect which is memory. Since Arrays are saved as a single block, where each element has a specific location this takes much more space in the RAM as opposed to a linked implementation which is stored randomly and as indexes of the array itself.

Array Implementation:

  • Pros: Much Faster and Easier to target a specific element
  • Cons: Much More Space needed

Linked Implementation

  • Pros: Less overall space needed
  • Cons: Much slower speed.
5 0
3 years ago
Other questions:
  • What is the function of the modem?
    12·2 answers
  • A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
    14·1 answer
  • Which of the following is LEAST needed when programming a computer?
    7·1 answer
  • What UDP port is used by a default WDS server setup when it is listening for PXE boot requests​
    12·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • Using a conversation voice is part of:
    9·1 answer
  • Select the correct answer.
    9·1 answer
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • List three things to be safer online.
    8·1 answer
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!