1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
11

My desktop has problems; my icons, taskbar, and background are missing. I always have to use task manager to refix it every time

I log on to my computer. How do I fix this problem and restart my computer to have the desktop show up again without using task manager? Someone please help!
Computers and Technology
1 answer:
skad [1K]3 years ago
4 0
Maybe restart your computer?
You might be interested in
Flash drive DVD and hard drive are all examples of
oee [108]

Answer:

flash drive DVD and hard drive are all examples of storage device

8 0
3 years ago
Read 2 more answers
Which Cisco IOS command is used to disable a device from performing naming lookups?
Ilia_Sergeevich [38]

Answer:

No ip dns server.

Explanation:

The DNS stands for domain name services. It can be statically or dynamically configured to a workstation from the DHCP request. It resolves the ip address of a server to it's name, so a client is not burdened by memorizing the ip address of every website.

In the cisco ios,  the "NO" command is used to negate other commands, so when a "no ip dns server" is used configured on a device, it stops every website name lookups.

3 0
4 years ago
Harrison worked on a spreadsheet to show market trends of various mobile devices. The suze
hjlf

Answer:

XLSB

Explanation:

It is certainly the XLSB, as in this case the data is stored in the binary format, and hence it can ensure much fast accessing of the file. Also, you are free to use all the formulas, and the file size is around 16384 COLUMNS and 1048576 ROWS. And it supports various types. Hence, the XLSB can ensure most memory effective storage of the data, and it does ensure very fast file access as well as the use of all the formula also as stated.

4 0
4 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
1.)How are people using computers? How can they access what they want? What sort of aesthetics do they expect?
NISA [10]

Answer:

1

In the equation x + 8.2 = –12.7, 8.2 is being added to the variable, x. How should you show your work to isolate the variable and solve the equation?

Subtract –12.7 from both sides. The solution is 20.9.

Add –12.7 to both sides. The solution is –4.5.

Subtract 8.2 from both sides. The solution is –20.9.

Add 8.2 to both sides. The solution is –4.5.

Explanation:

caN U ANSWER THIUS FIRSTY

7 0
3 years ago
Other questions:
  • How can a user choose settings that will customize a presentation so that it is best to be played automatically at a kiosk rathe
    11·2 answers
  • Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her
    12·2 answers
  • Jeremy, a college student, is preparing to give a speech on "Social Responsibilities." He refers to a Web page on a tab using
    10·1 answer
  • Ip addresses and their corresponding domain names are used to identify computers available through the internet.
    15·1 answer
  • Why do generated backup scripts usually include backticks around names such as database names and column names?
    5·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • Cross-functional systems are being phased out in favor of systems that support business processes within a single functional gro
    14·1 answer
  • Word-processing,spreadsheets, databases, and desktop publishing are all types of _______?
    12·2 answers
  • What do u think a creative app must have? <br><br> Please answer the question ASAP!!
    5·1 answer
  • What do other people think of e.t <br> in the movie E.T
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!