How solve the OptionalComponents cannot be opened. Access is denied. Vista

How solve the OptionalComponents cannot be opened. Access is denied. For Windows Vista 32 system, some Excel file cannot be opened, impossible to uninstall MS Office.

Hello

What type of account that you use
You have to put on the administrator account in windows vista

Activate the account administrator 'true '.
user name and edit the account register for this account

To activate the built-in Administrator account, follow these steps:
1. click Startand type cmd in the Search boxof start.
2. in the list of search results, right-click Guest, and then click run as administrator.
3. When you are prompted by user account control, click continue.
4. at the command prompt, type net user administrator / Active: Yesand then press ENTER.
5. type net user administrator , , and then press ENTER.
Note: Please replace the tag with passwords which you want to set for the administrator account.
6. type exitand press ENTER.
7 log off the current user account.

Tags: Windows

Similar Questions

  • Unable to delete the file, get the error 'cannot delete file access denied. "

    See the error will not remove the file:

    cannot delete file access is denied.
    Make sure that the disk is full or write-protected and that the file is not currently in use
    * original title - not delete the file show error *.

    Start in safe mode and try. If still no joy, try this tool.

    Unlocker File Remover
    http://www.emptyloop.com/Unlocker/

    Alternative download sites.

    Download it from FileHippo
    http://filehippo.com/download_unlocker/

    Download from CNET
    http://download.CNET.com/Unlocker/3000-2248_4-10493998.html

  • I click on the links in the email and get a box that says: "this file does not have a program associated with it for performing this action" and the link cannot be opened.

    Original title: problem e mail

    I click on the links in the email and get a box that says: "this file does not have a program associated with it for performing this action" and the link cannot be opened.

    Suggestions;

    1. make sure that your e-mail program is your default program.

    2. make sure that your Internet Explorer, or your main browser has all its faults.

    You can do both of the above by following these steps...

    Start button > right column, click default programs > click Set Your Default programs...

    1. click on your e-mail program > it doesn't say "this program has all its defaults"?
    If not, click on choose by default for this program > check all boxes below the list > click on save when finished.

    2 do the same as above for your Internet Explorer, or your main browser.

  • trying to UN-ininstall print driver error message: could not remove the HP LaserJet 1020 driver. The specified printer driver is currently in use. __Failed to remove the hplj1020.inf package. Access is denied.

    I have a new win 7 and have a lot of trouble installing an HP laserjet printer.

    When you try to remove the drivers under properties of the print server, I get the following message:

    "Cannot remove the HP LaserJet 1020 driver. The specified printer driver is currently in use.
    Impossible to remove the hplj1020.inf package. Access is denied. »

    someone knows what's the problem?  the prnter is not yet connected.  Must not be in use.  The problem I had was that the stuff sent to the printer seems to sit and take 15 ins to print a test page.

    How can I remove the drivers?

    Stop the print spooler service, and then start the print spooler service.  Now, delete the print driver and packaging. Alan Morris Windows printing team seek here Microsoft Knowledge Base: http://support.microsoft.com/search/Default.aspx?adv=1

  • How is the best way to improve my office from Vista to Windows 10 to 15/02/16 date?

    Original title: Conversion of Vista to win 10

    How is the best way to improve my office from Vista to Windows 10 to 15/02/16 date?

    Buy a full version of Win10 & do a clean install - assuming that you think 10 + years material will be compatible Win10.

  • The document cannot be opened because it is corrupt or damaged

    The problem occurred when I use my iPad to read, highlight and save the PDF document in creative cloud.

    After that I read, marked and saved the document, it cannot be opened.

    So far I have not experienced this problem using Adobe Acrobat DC with my PC to read, mark and save the document, only with the iPad, it happened several times, even though I have uninstall Adobe Acrobat Reader and install again, this kind of problem happen again.

    Why and how it can be fixed?

    Hello

    Sorry for the inconvenience caused to you.

    Product teams are actively studying reports from users of damaged documents. Once I have updated extra I'll keep updated.

    Thank you for your patience.

    Kind regards

    Tariq Dar.

  • How did the same predicate is completed access and filter?

    SELECT select, j.job_title, d.department_name

    OF e hr.employees, hr.departments d, hr.jobs j

    WHERE e.department_id = d.department_id

    AND e.job_id = j.job_id

    AND select LIKE 'a % ';

    Execution plan

    ----------------------------------------------------------

    Hash value of plan: 975837011

    ---------------------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------------------------

    | 0 | SELECT STATEMENT | 3. 189. 7 (15) | 00:00:01 |

    |* 1 | HASH JOIN | 3. 189. 7 (15) | 00:00:01 |

    |* 2 | HASH JOIN | 3. 141. 5 (20) | 00:00:01 |

    | 3. TABLE ACCESS BY INDEX ROWID | EMPLOYEES | 3. 60. 2 (0) | 00:00:01 |

    |* 4 | INDEX RANGE SCAN | EMP_NAME_IX | 3 | | 1 (0) | 00:00:01 |

    | 5. TABLE ACCESS FULL | JOBS | 19. 513. 2 (0) | 00:00:01 |

    | 6. TABLE ACCESS FULL | DEPARTMENTS | 27. 432. 2 (0) | 00:00:01 |

    ---------------------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("E".") DEPARTMENT_ID "=" D ". ("" DEPARTMENT_ID ")

    2 - access("E".") JOB_ID '=' J '. ("' JOB_ID ')

    4 - access ("E". "Last_name" LIKE 'A %') "

    filter ("E". "LAST_NAME" LIKE 'A %') "

    I understand not only how to select column is evaluated by the access and filter? Can someone there explain please? Or recommend me an article or document that explain this predicate excatly explains to explain the plan?

    Thanks in advance.

    Near NightWing.

    I believe that the predicate can be used to access THE index entries and if entries of access could include potentially "false positives" then filtering is required to remove the FPs.

    This filtering can be done in the same step of the operation (such as access) or as an extra step.

    My apologies, this has become much longer and more detailed that I intended it to be. :-(

    If I understand correctly,

    In terms of the explanation of the path, each step can include access and filtering process for "entries" (index or line). In the plan to explain the predicate section shows Information the use of predicate for step 'matching. "

    Some predicates can be "used" to ACCESS (ing) the entries, while the same or additional predicates (or even other) can be "used" to FILTER (ing) access entries (which have been consulted, but the optimizer is not sure that EACH AACCESSed entry is indeed a part of final result set). In such cases optimizer applies filtering predicate also during the operation stage. The optimizer can sometime even add additional operation steps or predicate [almost like a short circuit]

    So, using our previous configuration, allow us to run test cases.

    In this query we use AS predicate but the operand does NOT contain any 'wild' character In this case INDEX RANGE SCAN is performed, but since there is no wild characters are involved we can be sure that each entry using this predicate is indeed part of the final result set. This predicate Section shows that the predicate is used ONLY to access (index) entries.

    We know that the result set of this query is NULL lines.

    > explain plan for select v1 of tst where v1 as "A".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" = 'A')

    However, in this application, there is a wildcard character in the predicate, so while the INDEX RANGE SCAN step access entries using this predicate, it could potentially access entries that can be part of the final result set. So in the SAME step of the INDEX RANGE SCAN operation the predicate is also used for filtering. Since this is the only predicate, it may seem redundant.

    > explain plan for select v1 of tst where v1 like 'a % '.

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" LIKE 'A %')

    If we add an another predicate as below (also includes wild character), it gets interesting. INDEX RANGE SCAN step performs two access AND filtering.

    Please note that the predicate 'V1' AS '%' is used to ACCESS and FILTER, fine FILTER uses additional predicates.

    > explain plan for select v1 of tst where v1 like 'A %' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" IS NOT NULL AND "V1" LIKE 'A %') AND "V1" LIKE "%c"

    When we change the predicate 'V1' LIKE 'A %' to 'V1' > 'A', then we can use the predicate to access entries AND do not forget that each entry using this predicate are

    Indeed part of results if other predicates are met. In this case optimizer of must not filter on 'V1' > 'A', wherever it must continue to filter on 'V1' LIKE '%c '.

    > explain plan for select v1 of tst where v1 > 'A' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A')

    filter ("V1" IS NOT NULL AND "V1" LIKE "%c")

    Of course, if we do the predicate so that the entries are NOT accessible using the predicate, then for INDEX FULL SCAN (no Beach cannot be determined) operation comes into play and the predicate of ACCESS goes. All entries in the index are ALWAYS accessible (predicate applied no ACCESS) and FILTER predicate is applied.

    > explain plan for select v1 of tst where v1 like '%c %'

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     1 (0) | 00:00:01 |

    |*  1 |  INDEX SCAN FULL | TSTV1_IDX |     1.     8 S     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter ("V1" IS NOT NULL AND "V1" LIKE '%A%c')

    For the example proposed by JL, two predicates are used in the INDEX RANGE SCAN step to access THE entries. In addition, we can be sure that all entries that are accessible with success using this predicate can be included in the final result set. So not necessary filtering.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A' AND "V1")<>

    Interestingly, when we change the 'B' in the previous query to 'A', change predicates of inequality, so we cannot use index. Optimizer knows this and switches for FTS and introduced an additional step of operation FILTER. In my view, the filter predicate can be applied in operation of FTS. Additional FILTER stage is the predicate as FALSE hard-coded value. It does not yet use our predicate of the query.

    Well, don't know if he actually bypasses the operation of FTS. SQL trace can indicate that.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ---------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |      |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |      |       |       |            |          |

    |   2.   TABLE ACCESS FULL | TST |    49.   343.     3 (0) | 00:00:01 |

    ---------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL AND NULL IS NOT NULL)

    Subsequently, optimizer decides to use the INDEX RANGE SCAN, even if the predicate is always an inequality. Go figure...

    > explain plan for select v1 of tst where v1 > 'A' and v1<=>

    -------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    -------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |           |       |       |            |          |

    |*  2 |   INDEX RANGE SCAN | TSTV1_IDX |     1.     8 S     0 (0) | 00:00:01 |

    -------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL)

    2 - access("V1">'A' AND "V1")<>

    As others have said, it is difficult to understand and predict the path, but fortunately Oracle doing the right thing, 99% of the time.

    VR

    Sudhakar

  • Please HELP - I am trying to open a catalog and window says: the catalog cannot be opened becau

    Please HELP - I am trying to open a catalog and window says: cannot open the catalog because another application has already opened - but NOT the OTHER RCTs is open. The continue button does nothing and there is a button to choose a different catalog which I did not need. How do I avoid this? Can HoD I open the catalog. I even tried to open it on the other computer and said the same thing. This is a problem with the hard drive? THANKS for any help!

    Lenka,

    Easy solution: find the catalog of lightroom on your hard drive. It ends by ".". LRCAT. In the same folder, there will be a file named .lock. Remove the .lock file and then run Lightroom. Everything will be fine.

    HAL

  • Legal MT font family - missing, so the file cannot be opened

    We have received an email, well let's say it seems a bit suspicious, he said that it is from a law firm (Googling the Agency has confirmed that there is such an undertaking) and pretending that we have broken some laws, with an attachment that submits to the fine for virus.

    In any case, the attachment is a PDF file, which cannot be opened, a javascript warning came suggesting that we lack "Legal MT font family".

    Is it still a family of fonts in Adobe? Anyone who has heard this or I guess this is more likely to be a fake and not legitimate would be correct?


    Anyone else seen something similar or learn more on this subject? Any comments would be appreciated.


    AT-CREMail.PNG

    Do not try to search and download this font. Search Google can bring you to fontuniverse dot xyz site that allows you to download the font. But it is not a font, it's a ransomware!

    So, delete the PDF file and inform your staff about this.

  • Is there a function in Adobe Acrobat which allows me to create a PDF file that has a capacity of "self-destruction"?  We have a situation where we allow people to download PDF files, but after a series of time (48 hours), the file cannot be opened and rea

    Acrobat can create PDF files that once downloaded - cannot be opened after some preset (48 hours)?

    Sorry, Acrobat has no such feature of "Self-destruct" you ask.

    Kind regards

    Rave

  • When you try to schedule a task in XP, make a mistake "the new task could not be created the specific error is 0x80070005: access is denied."

    My

    System Type X 86-based PC
    Processor x 86 Family 6 Model 23 Stepping 10 GenuineIntel ~ 3324 Mhz
    A05 BIOS Version/Date Dell Inc., 07-31-2009
    SMBIOS 2.5 version

    I'm trying to schedule a new task I get this error

    The new task could not be created specific error is 0x80070005: access is denied

    I am an administrator for this computer and I am connected to the office network.

    I downloaded a patch KB904423, but it tells me that the installer has detected that the SP of the system version is newer the updte I am applying, I did not need to install this update

    Is there any fix for this?

    Thank you

    Hi dgxp64,

    ·         The computer is on a domain network?

    Method 1: Temporarily disable the antivirus on the computer program and check if it helps. If it works, you may need to check the settings of the program.

    Note: Check that you activate your anti-virus protection on the computer back after you complete these steps. It is not recommended to disable these settings on the computer. It's just to solve the problem.

    Method 2: Check to see if this article helps you.

    How to solve the scheduled tasks in Windows XP and Windows Server 2003

    Method 3: We will grant permission for the C:\Users folder and check if it helps.

    How to set, view, change, or remove special permissions for files and folders in Windows XP

    If the computer is on a domain network you can post your query on the TechNet Forums.

    Windows XP IT Pro category

  • LR 6.5 Mac error 16 how solve the problem? Access right to the correct folders...

    Hi all

    When I updated to 6.5 LR. on a captain El MAC, I got an LR error stopped and asked me to change file access rights. I did it but the problem remains.

    I have change the law according to the recommended page.

    My Mac is in the language of the French OS.

    Who can help me, I'm stuck without the possibility to use LR on my MAC for 24 hours already

    Thank you

    Patrice

    Hello Tanuesree,

    problem solved. I've been away the ~/Library/adobe access.

    Now it's working.

    Thank you very much

    Patrice

  • Old Airport Express lost after reset of the router, the connection cannot be seen/accessed

    the train:

    -Mid 2009 Macbook Pro, OS Yosemite airport 6.3.5 10.10.5, utility

    -Existing wifi network via a former Ubiquiti AC wifi or router which gets internet radio antenna on the roof of the local ISP.

    -old (1st gen.) A1084 Airport Express used only as a customer to listen to the music of the said Macbook.

    I am a musician who has been using my old AEX to listen to the music and the recording via Airplay and Airfoil for my Roland onstage for years without problem. I don't remember how I initially put in place, but I think it's as a customer only... IE, it broadcast as its own wireless network, or extend my network wifi etc, I just use it for listening to music.

    Well, a week earlier, a disgruntled rogue ex-my local ISP hacked their radio tower and all the customer routers turned into useless bricks (and also all our wifi network names changed to a name that begins with "mother" and ends by "-ers", but that's another story).

    Local ISP technicians have managed to get my router all re - set up and working, but I had to reconfigure my wireless devices (example: wifi printer) from scratch to be able to connect again.

    The tenacious hold on is this old Airport Express.

    I try to use the instructions found online to get connected again, but nothing does.

    Yes, I tried pressing the Reset button for 10 seconds, etc... He just goes at once orange flashing or sometimes solid orange light, and don't see the Airport utility. I tried to plug its ethernet port to the router's LAN port to see if the Airport utility, would see no change, Airport utility requires no base stations found. It has no Airport icon in my menu bar and no Airplay icon in any relevant application such as iTunes.

    Remember that in past I was able to reset/reconnect after network changes, it seems to me (I don't remember how). BTW, its location is located a few feet from the router, in order to hang it up through ethernet is easy if need be.

    Once again, I only want to not to listen to the music and the tracking records of my Macbook. Roland aren't in a convenient place for an electrician. As you can tell the age of my stuff, I'm a starving musician, don't want to have to buy something new.

    Help?

    Hello lisajoy,.

    Thank you for using communities of Apple Support. I see that you are having some connection problems with your AirPort Express Terminal. You did a great job trying to get this resolved on your own! I'm happy to help you.

    To solve problems, get connected Airport please try the steps in this link:

    AirPort Express: How to join an existing Wi - Fi network in client mode

    If you connect and are experiencing problems using AirPlay and iTunes heres some more information:

    Wi - Fi base stations: how to install and configure AirPort Express for AirPlay and iTunes

    Have a fantastic day!

  • Outlook Express - backup Clickfree, my emails SENT in the files cannot be opened on the Clickfree backup of said I need .dbx to see.

    When I backed up my emails SENT that were in folders on my computer, they have been backed up on the Clickfree, but I need .dbx to open them and read them. I said to contact Microsoft. I do not understand how to do this.

    I'm not familiar with Clickfree. No it doesn't have a restore function? Once you have saved the sent items, you remove them from OE?

    In order to read messages, you need get the dbx file in OE.

    Restoring individual dbx files:
    http://www.oehelp.com/backup.aspx#imp1

    Bruce Hagen ~ MS - MVP [Mail]

  • Vista Windows Movie maker clip sent by e-mail, but cannot be opened by recipient of Vista: how to fix?

    1. how to ensure a video clip is visible on the compatible PC?
    2. how to convert a movie file type to be viewed on a Mac?

    Hello
     
    Please answer the following questions so that we can better help you.
    1. what e-mail program you are using to view the clip?
    2 what is Windows Mail or Internet Explorer?
    3. that you get an error message when tried to open the clip?
    4. is the item sent by a user by electronic mail is running Vista or any other operating system?
     
    First, download the clip, save it to the desktop and try to open it using Windows Movie Maker.
     
    "Thanks to jakeludington for providing the following valuable information."
     
    How to convert Windows Movie Maker files in a Mac compatible file?
    Windows Movie Maker files are the format of Windows Movie Maker project. The files say things to Windows Movie Maker on your video editing project like video clips are used, which audio files you have imported, go to what transitions between clips, and whose effects are used. These files are essentially readable only in Windows Movie Maker and certainly doesn't work on a Mac. Two options to save a video file in Movie Maker are DV - AVI or WMV. To create a Mac compatible video file, open the file in Windows Movie Maker in Windows Movie Maker, save the movie to the highest quality WMV or preferably as a DV - AVI file format. Import the AVI or WMV file ended up in iMovie or another Mac video editing application.
     
    To convert Windows Movie Maker files in Mac format, please post your request here: http://discussions.apple.com/index.jspa
     
    I hope this helps.
     
    Kind regards
    Syed V
    Answers from Microsoft supports the engineer.

Maybe you are looking for