Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching configuration and decides to copy the bootmgr file from the working computer to the computer with the problem. However, your friend is having problems finding the bootmgr file and asks for your help. What is your best response?

Answers

Answer 1
Answer:

Answer:

He should remove any removable devices from the PC , change the boot device to USB or CD drive and insert the installation disk or a created ISO USB file to install

Explanation:


Related Questions

Which of these is outside the scope of an art director's responsibility?
​In sql server, the cursor property ____________________ means that the cursor is used for retrieval purposes only.
Write a program that accepts a four digit number, such as 1998, and displays it on number on a line, like: 1 9 9 8 The program should prompt for a four digit number. The program assumes that the user enters the correct information. Provide the java code, including a comment with your name, course code and date.
PLEASE ANYONE!!which present margins would be best to get the most information to fit on the page​
Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.

An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sending packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue? A. Firewall; implement an ACL on the interface B. Router; place the correct subnet on the interface C. Switch; modify the access port to trunk port D. Proxy; add the correct transparent interface

Answers

Answer: (A)  Firewall; implement an ACL on the interface

Explanation:

 According to the question, for re-mediate the issue firewall should be implemented the ACL (Access control list) on the given interface. The access control list is one of the type of logic which selectively give permission or deny the number of packet in the system which to through the interface.

Firewall is the type of device that basically examine the traffic in the network system and also make several decisions in the system. ACL is the set of rule which mainly define the route of the packet in the router interface state.

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?

Answers

Answer:

The screen protector may be interfering with the touch response

Explanation:

Screen protectors or commonly called screen guards are used to protect phone screens. In case they fall to the ground, these protectors act as shields to keep the phone screen from getting damaged. However screen protectors if not positioned or fixed properly may also cause hindrance to effective touch response as they become barriers to the touch screen.

What is the term used to describe participants starting a study but then leaving it? o abandonment o drop outs o margin of error O mortality

Answers

Answer: Drop out

Explanation: Drop out is the situation that is defined as abandoning a study  in between after taking up or participating in it.This is considered as the act of withdrawal which can happen due to personal reason, lost interest in the course/study,etc.

Other options are incorrect because abandonment is leaving something before taking up or during the course, margin of error is used for defining the error that occurs in the sample survey and mortality signifies temporality or death.Thus, the correct option is drop out.

"Write an SQL query that displays the Ssn and Last name of all employees who is a supervisor of a Department Manager"

Answers

Answer:

SELECT Ssn,

             Last_name

 FROM employees

WHERE position = supervisor;

Explanation:

SELECT is an SQL query statement that is used to initiate the display of wanted variables.

The names of the variables often succeed the SELECT statement and they are separated by commas.

FROM is an SQL query statement that indicates the table fro which the selected variables be displayed.

WHERE is used to filter your search and return only rows that meet the criteria.

; signifies the end of a query and calls for an execution.

Our favorite program runs in 10 seconds on computer A, which has a 2 GHz clock. We are trying to help a computer designer build a computer, B, which will run this program in 6 seconds. The designer has determined that a substantial increase in the clock rate is possible, but this increase will affect the rest of the CPU design, causing computer B to require 1.2 times as many clock cycles as computer A for this program. What clock rate should we tell the designer to target?

Answers

Clock rate is simply the number of clock cycles a computer can perform in a second

Computer B should be designed to have a clock rate of 4GHz

The given parameters are:

\mathbf{t_A = 10s} --- time on computer A

\mathbf{c_A = 2GHz} --- computer A clock

\mathbf{t_B = 6s} --- time on computer B

Start by calculating the period of computer A

\mathbf{T_A = (1)/(c_A)}

So, we have:

\mathbf{T_A = (1)/(2GHz)}

Rewrite as:

\mathbf{T_A = (1)/(2 * 10^9 Hz)}

So, we have:

\mathbf{T_A = 0.5 * 10^(-9) s}}

Next, we calculate the required number of clocks on computer A

\mathbf{n_A = (t_A)/(T_A)}

So, we have:

\mathbf{n_A = (10)/(0.5 * 10^(-9))}

\mathbf{n_A = 20 * 10^(9)}

Computer B requires 1.2 times as many clock cycles as A.

So, we have:

\mathbf{n_B = 1.2 * n_A}

This gives

\mathbf{n_B =1.2 * 20 * 10^(9)}

\mathbf{n_B =24 * 10^(9)}

The clock period of computer B is:

\mathbf{T_B = (t_B)/(n_B)}

So, we have:

\mathbf{T_B = (6)/(24 * 10^(9))}

\mathbf{T_B = 0.25 * 10^(-9)}

Lastly, the clock rate of computer B is:

\mathbf{c_B = (1)/(T_B)}

\mathbf{c_B = (1)/(0.25 * 10^(-9))}

\mathbf{c_B = 4 * 10^(9)}

Express in gigahertz

\mathbf{c_B = 4 GHz}

Hence, computer B should be designed to have a clock rate of 4GHz

Read more about clock rates at:

brainly.com/question/14241825

Answer:

4 GHz

Explanation:

Time taken for computer A to execute the program is = 10 secs

Given frequency of the clock for computer A is = 2 GHz

We know Clock period = 1 / frequency = 1 / 2 * 109 = 0.5 ns

Number of clocks requried to execute the program in computer A is

= Total Execution time / clock period = 10 / 0.5 * 10-9 = 20 * 109 clocks

Given Time taken for computer B to execute the program is = 6 secs

Given computer B requries 1.2 times as many clocks as computer A

implies number of clocks to execute program in computer B = 1.2 * 20 * 109 = 24 * 109

Here clock period of computer B = Total execution time / number of clocks

                               = 6 secs / 24 * 109

                               = 0.25 ns

Hence clock rate = frequency is = 1 / clock period = 1 / 0.25 ns = 4 GHz.

Which of the following protocols is used to unsure secure transmissions on port 443?A. HTTPSB. TelnetC. SFTPD. SHTTP

Answers

Answer:

A. HTTPS

Explanation:

Default HTTP port is 80. This means that the server request is received on port 80. But default HTTP request is susceptible to interception. In order to prevent it, HTTP communication is secured using SSL encryption (HTTPS protocol). In this case the Url string begins with 'https://' which differentiates it from normal web request. The default port used for HTTPS service is 443 instead of 80.