Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Does Anyone Know How I Can Fix This? I Dont Know What Is Wrong. When I Click Retry It Restarts My Laptop

Answers

Answer 1

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.


Related Questions

¿Cuál es la ventaja principal de una tabla dinámica?

Answers

Explanation:

Ventajas de las tablas dinámicas de Excel:

Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.

Businesses today suceed or fail based on their ability to

Answers

Answer:

their ability to Innovate with technology to meet their customers needs

Explanation:

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:


What is the difference between hacking and cracking

Answers

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

learn to accept your mistakes even when you have done your ​

Answers

Answer:

besttttttttttttttttttttttt

Answer: done your best :)

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

j. A computer on a network that acts as the central storage location for

programs and data used on the network

Answers

Answer:

Una unidad central (en inglés mainframe) es una computadora grande, potente y costosa, usada principalmente por una gran compañía para el procesamiento ...

Explanation:

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a

Answers

Answer:

A reverse proxy.

Explanation:

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.

In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.

Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

Can you recommend me a movie? ​

Answers

Ice age definitely……….

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

The Blue Screen of death is not an common error, and it is highly likely that you have encountered and fixed several already. Discuss errors you have come across, and the troubleshooting steps that you took to resolve the problem.

Answers

Answer:

your anwser is B

Explanation:

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?

Answers

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.

What steps are needed for word to create an index

Answers

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

Answer:

Position the insertion pointer where you want the index to appear.

(the insertion point is the point where the next characters typed from the keyboard will appear)

If you want the index to start on a new page, create a new page in the program you're using

Then you click the References tab.

In the Index group, click the Insert Index button.

When the Index dialog box appears, click the OK button to insert the index into your document.

Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective

Answers

the board if not try a restart a couple more times and we see what happens from there

How a student can use computer to improve academic performance?

Answers

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

Answer:

A student can use it by searching up things with his/her computer.

Browse for different new things everyday that gives knowledge.

Ask questions.

Do new things everyday.

A computer can easily input grades and send data.

Explanation:

Okay.

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher

Answers

Answer:

The file extensions of files created with Microsoft Office Access is .adb for Access project

The file extension of files created with Microsoft publisher is .pub

Explanation:

The file extensions of files created with Microsoft Office Access are;

.adp = Access project

.adn = Access blank project template

.accdb= Access database for 2007, 2010, 2013, and 2016 versions

Other file extensions include

laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf

The file extension of files created with Microsoft publisher is the .pub

main components of Adobe photoshop are. ...............
a) title bar
b) tool bar
c) menu bar
d) all of this ​

Answers

Answer:

The correct option is;

d) All of this

Explanation:

The main components of Adobe Photoshop are;

1) Title bar displays the name of the application, as well as the name of the current document and it is located at the top of the document window

2) Tool bar is the component of the interface design in which on-screen buttons, menus, icons, and other features for input and output are placed

The tools palette is the toolbar in Adobe Photoshop

3) Menu bar consists access to the basic components such as file, edit, image, layer, used to create new jobs, compose, and edit images.

Answer:

It is all of this.

Explanation:

Here it is

Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)

A. tools
B. information
C. capital
D. people
E. power

Answers

I think the answer would be tools cause that what Ron would use. The answer is tools
Other Questions
A prepositional phrase can function in a sentence as_______.A) An adverb phraseB) A noun phrase why are Don Gonzala and Laura annoyed with each other? Digital communication should be used carefully and screened for unintentional meaning. True Or False Reflection on the face behind the mask movie cuc cch mng trong khoa hc t nhin cui th k 19 u th k 20 v s ph sn ca cc quan im duy vt siu hnh v vt cht l quan nim ng nht vt cht vi vt th. quan nim ng hay sai. ti sao. expand (x-4)^4 with binomial theorem or pascal's triangle Can you just answer this question quickly please what is the answer to 420 12 it is multiplication. thanks 1. Answer the following question with a complete sentence. Begin your answer with either s or no. Te gustan los exmenes de espaol? 2. Answer the following question with a complete sentence using the cue in parentheses. Qu hiciste ayer? (trabajar) 3. Answer the following question with a complete sentence using the cue in parentheses. Adnde fuiste el fin de semana pasado? (ir al cine) 4. Answer the following question with a complete sentence using the cue in parentheses. A qu hora te acuestas normalmente? (11:00 de la noche) 5. Answer the following question with a complete sentence using the cue in parentheses. A qu hora empieza la clase de matemticas? (10:00 de la maana) 6. Answer the following question with a complete sentence using the cue in parentheses. Qu sirvi mam para la cena? (hamburguesas) 7. Answer the following question with a complete sentence using the cue in parentheses. Cmo eres? (divertido/a y cmico/a) 8. Use the prompt in parentheses to write a complete sentence that answers the following question. Qu hiciste durante el fin de semana? (jugar baloncesto) 9. Use the prompt in parentheses to write a complete sentence that answers the following question. Hace cunto tiempo que Marta estudia espaol? (2 aos) 10. Answer the following question in a complete sentence that starts with yes or no. Quieres viajar a Colombia? What is the accepted average calorie requirement in India? Why calorie requirement is higher in the rural areas? which of the following can not happen when a light ray strikes a new medium What is the measure of angle X? x = 4 7 9 I dont mind for a step by step A circle has a radius of \sqrt{45} 45 square root of, 45, end square root units and is centered at (-2.4,-4.8)(2.4,4.8)left parenthesis, minus, 2, point, 4, comma, minus, 4, point, 8, right parenthesis.What is the equation of this circle? his oratory (worked up/worked out) the feelings of the crowd...worked up or worked out Which of the following best characterizes an adaptive radiation? Which of the following best characterizes an adaptive radiation? Natural selection is particularly intense because disruptive selection occurs. A single lineage diversifies rapidly, and descendant species occupy many habitats and ecological roles. Descendant species occupy a large geographic area. Species recover after a mass extinction. uno de los ngulos interiores de un triangulo mide 100 grados y la diferencia de los otros 2 es de 25 grados Cunto mide el Angulo menor? HELP ASAP!!The equation (blank) has no solution Hamas and Hezbollah are examples of ____ terrorist groups, or groups that promote the interests of a minority, ethnic, or religious group because members believe they have been persecuted under majority rule and wish to carve out their own independent homeland. what does the narrator feel he has walked into? Monster by walter dean meyers For a particular disease at a specific time period, morbidity rates should always be equal or greater than mortality rate.a. trueb. false