Fred has saved a large number of Word documents on his computer running Windows 7 Home Edition. He installs Windows 10 on his computer, using the same partition on which Windows 7 was installed. He does not reformat this partition. What happens to these documents

Answers

Answer 1

These documents are placed in the Windows.old\Documents and Settings\Fred\My Documents folder.

Which Windows 10 installations demand that you submit a product key before they may be installed?

You will require a product key to do a clean install of Windows 10 on a computer when you are utilizing bootable installation media that has never been upgraded to the operating system and activated. Windows 10, as well as a compatible edition of Windows 7, Windows 8, or Windows 9, can be used to enter a product key. 1

Which approach from the list below is used to install Windows 10 completely from scratch on a new computer?

Migration via wiping and loading The user data and settings must be backed up to an external place before you may install Windows 10 on an already-existing PC using this approach. The user data and settings need to be restored after that.

To know more about Windows visit

brainly.com/question/13502522

#SPJ4


Related Questions

The local Internet provider wants to develop a network that will connect its server at its satellite center in Valparaiso with the main city computer centers in Northwest Indiana to improve the Internet service and to minimize the amount of cable used to connect network nodes. If we represent this problem with a network:

Answers

The goal of the minimal spanning tree challenge is to connect every node in a network while minimizing the overall branch lengths.

What kind of data cable does the television industry use to transmit data and video signals?

Coaxial cables are able to transmit huge volumes of data as well as carry information in both directions. Only a small part of the bandwidth available through coaxial cables is used by cable television signals.

How is a computer connected to a network? What kind of connection is used?

A Local Area Network, or LAN, is a network of computers in a constrained space, such as a workplace, campus, or even your home, that is connected by Ethernet cables. The Ethernet connection from the internet provider is connected to the wireless router that is prevalent in many households.

To know more about LAN visit:-

https://brainly.com/question/13247301

#SPJ4

Why would a user most likely want to record a presentation? Check all that apply.
to provide access to hyperlinks for all participants
to practice timing when rehearsing the presentation
to add narration to a kiosk presentation to enhance it
to allow audience members to review it or watch it again
to allow all users to edit the presentation to their preferences
to allow users to see it if they were unable to attend in person

Answers

Answer:

to allow users to see it if they were unable to attend in person

to allow audience members to review it or to watch it again

to practice timing when rehearsing the presentation

Answer: 2, 3, 4, 6

Just did it

URGENT: What process helps a web developer to prevent mistakes while helping provide solutions to a customer?

Answers

The process which helps a web developer to prevent mistakes while helping provide solutions to a customer is proper communication to the customer.

Who is a web developer?

Websites are created and maintained by web developers. They are also in charge of the site's technical components, such as performance and capacity, which are measures of a website's speed and capacity to handle the traffic.

Web developers may also contribute material for the site. You will face several problems as a web developer. Some will be simple to repair, while others will be quite difficult."

Therefore, proper communication with the customer is the procedure that enables a web developer to avoid mistakes while assisting in the provision of solutions to customers.

To learn more about web development, refer to the link:

https://brainly.com/question/9297287

#SPJ1

the ____ technology trend may change the way users access software and data.

Answers

The cloud computing technology trend may change the way users access software and data.

Data management software (DMS) integrates several data kinds into a single resource, like a database, or receives data and turns it into a single storage container. The more specific word data management software is frequently used interchangeably with the particular term data management tool since different data management tools may route incoming data to a database or group of databases. Database management software includes widely used applications like MS Access, Visual FoxPro, and SQL that help manage different kinds of data within their specific databases or data containers.

Cloud computing is the on-demand provision of computer system resources, particularly processing power and data storage, without direct active supervision by the user. Many times, large clouds divide their operations among a number of locations.

Learn more about Data management software

brainly.com/question/1913367

#SPJ4

Can scratch cloud variables save across computers? For example, if I save the cloud variable as 10, then log in from a different computer will that variable save from that other computer?

Answers

Answer:

Explanation:

Scratch cloud variables are a feature in Scratch, a visual programming language, that allows for saving and sharing data across different projects and even across different computers. Once a variable is saved as a cloud variable, it can be accessed from any other project that has been shared with the same Scratch account.

If you set the value of a cloud variable to 10 on one computer, and then log in to Scratch from a different computer using the same Scratch account, you will be able to access the variable and its value (10) from that other computer.

It is important to note that the cloud variable feature is only available for Scratch accounts with a login, if you don't have a Scratch account, you won't be able to use this feature.

It's also good to keep in mind that if you set a variable as a cloud variable in a project, it will be accessible to anyone who has access to that project. So make sure you understand the sharing settings and permissions before using cloud variables in a project that contains sensitive information.

You are working on a computer named srv-2.forum.FootJob. What is the second level for this host name

Answers

Right-click Computer and select Properties from the menu that appears. Under Computer name, domain, and workgroup settings, the name of the computer is displayed.

What two types of domain names are there?

Generic top-level domains (gTLDs) and country-code top-level domains are the two primary categories into which TLDs are divided (ccTLDs). gTLDs, or generic top-level domains, are top-level domain names that specify the domain class they belong to (.com, . org, . edu, etc.).

Do you allow two-letter domains?

The majority of nations have a two-letter top-level domain (TLD) that corresponds to their country code. Germany has de, Canada has ca, while the United States has us.

To know more about domain visit:-

https://brainly.com/question/14508790

#SPJ4

what is a field on a table

Answers

Answer:

Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

example of tools and components at home​

Answers

Answer:

SOLDER REMOVER

SOLDERING STATION

SOLDERING IRON

PRECISION SCREW DRIVER SET

Suppose a method p has the following heading: public static Circle p() Which return statement may be used in p()

Answers

The return statement used in p() and public static int[][] p() is return new int[][]{{1, 2, 3}, {2, 4, 5}}.

What is static keyword in a Java program?Static indicates that a member belongs to a type itself, not to an instance of that type, in the Java programming language. This indicates that we'll only construct one instance of the static member, which will be used by all class instances. A Java program's static keyword denotes the primary method's status as a class method. This suggests that you don't require a class instance to access this method as well. The public keyword ensures that the method is available to all classes, so it is possible. Similar to an abstract, sealed class is a static class. A static class is different from a non-static class in that it cannot be instantiated or inherited, and all of its members are static.

The complete question is,
suppose a method p has the following heading. what return statement may be used in p()? public static int[][] p()

To learn more about Java program refer to:

https://brainly.com/question/26642771

#SPJ4

Write a method sameDashes that takes two Strings as parameters and that returns whether or not they have dashes in the same places (returning true if they do and returning false otherwise). For example, below are four pairs of Strings of equal length that have the same pattern of dashes. Notice that the last pair has no dashes at all.
string 1: "hi--there-you." "-15-389" "criminal-plan" "abc"
string 2: "12--(134)-7539" "-xy-zzy" "(206)555-1384" "9.8"
To be considered a match, the Strings must have exactly the same number of dashes in exactly the same positions. The Strings might be of different length. For example, the following calls should each return true:
sameDashes("1st-has-more characters", "2nd-has-less")
sameDashes("1st-has-less", "2nd-has-more characters")
because the Strings each have two dashes and they are in the same positions. But the following calls should each return falsebecause the longer string has a third dash where the shorter string does not:
sameDashes("1st-has-more-characters", "2nd-has-less")
sameDashes("1st-has-less", "2nd-has-more-characters")
Method problem: For this problem, you are supposed to write a Java method as described. You should notwrite a complete Java class; just write the method(s) described in the problem statement.

Answers

In Java that compares two strings for dashes. The test only returns true if each string has the same amount of dashes in the same position in the strings.

What is java? and how to write method described in problem statement?

Java is a programming language and computing platform first released by Sun Microsystems in 1995. It has evolved from humble beginnings to power a large share of today’s digital world, by providing the reliable platform upon which many services and applications are built. New, innovative products and digital services designed for the future continue to rely on Java, as well.Java is fast, secure, and reliable. Developers use Java to construct applications in laptops, data center's, game consoles, scientific supercomputers, cell phones, and other devices.

I have to write a program in Java that compares two strings for dashes. The test only returns true if each string has the same amount of dashes in the same position in the strings.

Comparing the following two strings

String string1 = "two-twenty-nine"

String string2 = "ten-forty-five and I'm hungry."

with the above criteria would return true. It doesn't matter whether one string is longer than the other.

Any assistance would be appreciated!

I have tried:

- converting the strings to char arrays and then comparing the indexes

- Using String. index Of() for each string, and then creating a variable int new Start = String. index Of() with the index of the previous dash as the new starting point to look from

public static void sameDashes(String string1, String string2) {

   int count = 0;

   char index1 = ' ';

   char index2 = ' ';

   char dash = '-';

   char[] string1Array = string1.toCharArray();

   char[] string2Array = string2.toCharArray();

   while (count < string1Array.length && count < string2Array.length) {

       if (string1Array[index1] == dash && string2Array[index2] == dash) {

           System. out. print ln("true");

To learn more about Java refers to ;

https://brainly.com/question/26789430

#SPJ4

write a program that will ask a user to enter a number between 1 and 10,000 and then report whether the number is prime.

Answers

To check if an integer n is prime, a rather straightforward approach is to verify if it is evenly divided by any integer from 2 to rootn. If none of them do, it is a prime; when you discover one that does, raise n.

What five prime numbers come to mind?

A whole number greater than 1 with only the number 1 and itself as factors is known as a prime number. A complete number that divides into another number equally is referred to as a factor. These are the first few prime numbers: 2, 3, 5, 7, 11, 13, 17, 19, 23, and 29.

What kind of program is this example of?

Users can generate and write documents using Microsoft Word, a word processing tool.

To know more about integer visit :-

https://brainly.com/question/15276410

#SPJ4

What measures bandwidth in terms of numbers transferred or received per unit of time?
A. Connection time
B. Broadband
C. Protocol
D. Bit rate

Answers

Your answer is D bit rate I hope this helps

You have a screen and a pen, which is an instance of the Turtle class.
What are the initial coordinates of the pen?
(100, 0)
(0,0)
(100, 100)
(0, 100)

Answers

Answer:

(0,0) and (0,100) (I think)

Explanation:

Answer:

(0,0)

Explanation: I got it right

to cut off part of the graphic in an illustration, you would _______ the illustration.

Answers

The prototype chosen for comparison won't be the same for every person, claims prototype theory.

A prototype is a pre-production version of a product created to test a concept or method. It is a phrase that is used in a wide range of situations, including semantics, design, electronics, and software development. Machine analysts and users frequently employ a prototype to assess a brand-new design that seeks to enhance precision. In cognitive science, particularly in psychology and cognitive linguistics, the prototype theory is a categorization notion in which certain contributors are more important than others and there is a graded credential of belonging to a conceptual class. According to the prototype theory, other objects fall within a category to the extent that they resemble the ideal instances (prototypes) that make up that category.

Learn more about Prototype here:

https://brainly.com/question/28187820

#SPJ4

100 points
Read this article discussing the amount of time that people of various ages and education levels report spending on different technologies. Ask at least 12 of your adult friends and family members the same survey question. (The more people you ask, the better.)

How do your survey results compare with the results in the article? What are some possible reasons your results might be different? When comparing the results, be sure to take into account the margin of error for the survey discussed in the article.

Answers

My survey results overall varied quite a bit from the results in the article. Many of my survey respondents reported higher estimates than what was found in the article, especially in regards to the time spent on television. This may have been due to a response bias, as participants may have been overestimating the amount of leisure time activities they undertake. Additionally, the demographics of my survey respondents may have been different from that of the article - for example, my survey respondents were primarily from the United States

#3: Which combination of statements can be used to express algorithms?
A) Iterative, sequential, and selection
B) Correctness, efficiency, and clarity
C) Readable, iterative, and efficient
D) Selection, conditional, and Boolean

Answers

Answer:

A) Iterative, sequential, and selection

Explanation:

The protocol data unit for the Physical layer of the OSI model is payload, or data.​
True
False

Answers

It is accurate to say that payload, or data, is the protocol data unit for the Physical layer of the OSI model. ​

What does the OSI physical layer's data unit go by?

A protocol data unit (PDU), an open-system interconnection (OSI) term used in communications, is a unit of data added or removed by a layer of the OSI model.

What does network layer protocol data unit mean?

A protocol data unit (PDU) is the fundamental unit of exchange in networking between entities that talk to one another utilizing a particular networking protocol. When addressing protocol interactions when working with a multilayer protocol stack, such as the TCP/IP networking suite, it is crucial to utilize the right PDU.

To know more about protocol data visit:-

https://brainly.com/question/14635177

#SPJ4

A backup utility can write copies of important data files and folders on ____.
a. an internal hard disk drive
b. an Internet server’s disk drive
c. a network server’s disk drive
d. any of these

Answers

An internal hard drive, a network server's disk drive, or any of the following are all places where a backup program can store copies of crucial data files and folders.

is a short-range wireless technology that enables users to text or make calls using their hands-free?

In order to exchange data between stationary and mobile devices over short distances and to create personal area networks, Bluetooth is a short-range wireless technology standard (PANs).

What do we term a set of various application software packages that are offered as a unit?

When a set of connected software programs (such a collection of graphics programs, utility programs, or office-related software) is offered as a package, that group of software is referred to as a software suite.

To know more about backup program  visit :-

https://brainly.com/question/23653581

#SPJ4

Which of the following is NOT a task typically associated with the systems analyst role?
a. conveying system requirements to software developers and network architects
b. troubleshooting problems after implementation
c. collaborating with others to build a software product from scratch
d. choosing and configuring hardware and software

Answers

The following is NOT a task commonly associated with the role of a systems analyst: working with others to develop a software product from scratch.

What task falls under the purview of a systems analyst?

Systems analysts evaluate how effectively software, hardware, and the overall IT infrastructure match the business requirements of their employer or a client. They write the specifications for new systems, and they might also aid in their implementation and evaluation.

What tasks are involved in a system analysis?

Develops ideas that define feasibility and costs; suggests, plans, tests, executes, and evaluates solutions; analyzes business process difficulties and/or problems; offers consulting support to system users; conducts research on potential solutions and makes recommendations based on results.

To know more about systems analyst visit :-

https://brainly.com/question/29331333

#SPJ4

Why is color theory important?

Background information about the content is illustrated.
An explanation of design principles like font style and size is provided.
Mixtures and combinations of colors can either create visual appeal or visual chaos.
Viewers will form hypotheses based on colors and design.

Answers

Answer:

Mixtures and combinations of colors can either create visual appeal or visual chaos.

The answer is b. I believe

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples

Answers

Destination unreachable time exceeded  represent message type.

An ICMP ping is what?

The message protocol used for the ping command is perhaps where ICMP is most well recognised. The target host receives an ICMP echo request when you use the ping command. An echo reply is given back by the target host.

What is an illustration of ICMP?

The Internet Control Message Protocol (ICMP) is a network protocol used for network management and troubleshooting. The "ping" utility, which makes use of an ICMP request and ICMP reply message, is an excellent example. An error message may be sent to the source by ICMP if a specific host or port cannot be reached.

To know more about ICMP visit

brainly.com/question/14689887

#SPJ4

Match the type of system to the application. Maintaining the temperature in a manufacturing plant Answer 1 Choose... Air conditioning single-family homes Answer 2 Choose... Air conditioning high-rise office buildings Answer 3 Choose...

Answers

The type of system and application,

Homes: Residential

Office buildings: Commercial

Manufacturing plant: Industrial

What kind of system is designed to distribute air around a building and resupply oxygen?

The process of exchanging or replacing air in any place to provide excellent indoor air quality comprises regulating temperature, replenishing oxygen, and removing moisture, smells, smoke, heat, dust, airborne bacteria, carbon dioxide, and other gases. This is known as ventilation (the "V" in HVAC).

Why are water-cooled condensers used by so many central system chillers?

However, not all chillers are effective for use in commercial settings. Because of their superior heat transmission, higher energy efficiency, and longer lifespan, water-cooled chillers are suited. They are frequently employed in big and medium-sized facilities with reliable and effective water supplies.

To know more about manufacturing plant visit:

https://brainly.com/question/14203661

#SPJ4

What happens when you leave a tablet charging for two days?

Answers

I am sure it will get 100% on the tablet. Maybe if you leave it charging for 2 days it might overheat and cause a fire.

Explanation:

Left the tablet charging for 2 days.

What were the necessary steps required to allow your cube to fire projectiles in the unit activity? What did each step actually do in terms of advancing you to that goal? (e. G. , you didn’t just "Create Object," you created a rigid body object to act as the projectile and allow for physics components to be assigned to it)

Answers

The goal of the unit activity was to create a cube that could fire projectiles. To achieve this, a variety of steps were necessary. These included:

Creating a Cube-Based Projectile Launcher

Connecting the battery holder to the cube’s power source allowed the cube to be powered.Attaching the motor to the cube’s motor mount allowed it to be securely positioned.Assembling the fan blades onto the motor allowed air to be pushed through the fan assembly.Attaching the fan assembly to the cube allowed air to be directed through the cube.Connecting the motor control circuit to the cube’s power source allowed the fan motor to be controlled.Connecting the fan motor to the motor control circuit allowed the fan speed to be regulated.Testing the fan assembly ensured that it was spinning correctly.Attaching the projectile launcher to the cube allowed the projectiles to be fired.Connecting the projectile launcher to the motor control circuit allowed the launcher to be controlled.Testing the projectile launcher ensured that it was firing correctly.

Learn more about Launchers: https://brainly.com/question/15443389

#SPJ4

Which of the following is NOT a factor a secure VPN design should address?
Select one:
a. encryption
b. performance
c. nonrepudiation
d. authentication

Answers

c. Nonrepudiation is NOT an concern that a secure VPN design must take into account.

Which one of the following doesn't constitute a VPN connection type?

C is the proper response.Explanation:A predecessor of PPP, SLIP is a keypad connection protocol.Not a VPN protocol, it.

What are the 3 ways a VPN may be used?

VPNs employ one of three different types of protocols:an industry standard (such as IP).a protocol for tunneling (such as PPTP or L2TP).routers that can establish and keep up a large number of VPN tunnels for secure network connections.

To know more about nonrepudiation visit:

https://brainly.com/question/15187715

#SPJ4

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and errors of computer when you detached the following Keyboard-PS/2 Mouse-PS/2 Hard disk- IDE cable Floppy disk drive-IDE cable Room disk-IDE CABLE

Answers

Answer: NO MORE TYPING! NO MORE CLICKING! NO MORE MEMORY! NO MORE OPERATING!

What is the term used for information about a computer file, distinct from the information it contains

Answers

Answer:

Metadata

Explanation:

This is type of data that provides information about other data, but not the content if the data, such as the text of a message or the image itself.

True or False: A base register is used to transform physical addresses (generated by the program) into virtual addresses.

Answers

False, a base register is not employed to convert physically generated addresses into virtual addresses.

How does the base & bounds method translate virtual memory addresses?

Each memory reference's virtual address and bound register are checked, and the result is added to the base register to create the physical address. An operating system trap is set off by a bound violation. The bound register appears to control the extent of a wholly private memory that is shared by all processes.

In an operating system, what does address translation mean?

Translation of addresses The system converts the logical address into a physical address and creates an entry in the page table when allocating a frame to any page. This entry will be used throughout the execution of the application.

To know more about virtual addresses visit :-

https://brainly.com/question/28261277

#SPJ4

Using what you know about variables and re-assignment you should be able to trace this code and keep track of the values of a, b, and c as they change. You should also have a sense of any possible errors that could occur. Trace the code, and choose the option that correctly shows what will be displayed

Answers

According to the question, option a: 10 b: 17 c: 27 accurately depicts what would be revealed.

Which 4 types of coding are there?

It's usual to find languages that are chosen to write in an extremely important, functional, straightforward, or object-oriented manner. These coding dialect theories and models are available for programmers to select from in order for them to meet their demands for a given project.

Is coding difficult?

It is common knowledge that programming is one of the most difficult things to master. Given how different coding is from long - established teaching techniques, which would include higher education degrees in computer science.

To know more about Code visit :

https://brainly.com/question/8535682

#SPJ4

The Complete Question :

Using what you know about variables and re-assignment you should be able to trace this code and keep track of the values of a, b, and c as they change. You should also have a sense of any possible errors that could occur.

Trace the code, and choose the option that correctly shows what will be displayed.

1 var a = 3;

2 var b = 7;

3 var c = 10;

4 a = a + b;

5 b = a + b;

6 c = a + b;

7 console.log("a:"+a+" b:"+b+" c:"+c);

The _____ ______ _______ task pane will present options to define aspects of the PivotTable report layout.

Answers

PivotTable Fields task panel will present options to define aspects of the PivotTable report layout.

Where is the fields pane for PivotTable?

When you click anywhere in the PivotTable, the Field List ought to come up. If after clicking inside the pivot table you don't see the field list, click anywhere else in the pivot table to see it. Click Analyze> Field List after displaying the PivotTable Tools on the ribbon.

The specific data that makes up the pivot table is contained in which pivot table area?

A PivotTable Fields task window is open on the worksheet's right side. It has four sections where different field names can be entered to build a pivot table: Filters, Columns, Rows, and Values. The task pane additionally has a checklist of the data fields from which to select one.

To know more about Pivot Table visit

brainly.com/question/29549933

#SPJ4

Other Questions
Guided Case Study Muscle Malady1) What symptoms is Rahul experiencing? 2) Describe 2 purposes of the blood test that was ordered. 3) What is the function of dystrophin and how is it altered by DMD? 4) Knowing the inheritance pattern of DMD, what can you predict about Rahul's family histors? 5) Assuming that Rahul lives until aduithood, he could have children. Show a Punnett Square illustrating the likelihood of Rahul passing this mutation on if he marries a woman with two normal X chromosomes. 6) What treatments are suggested for DMD? If tan 0= -21/20 what is cos 0 in quadrant 2 The comparison of cultures using anthropological evidence; concerned with the study of contemporary cultures, with a view to deriving general principles about human society is called Cite the three major problems with consumer interviews or surveys and provide an example of each. How many moles are in 7.46 x 1025 particles of iron Which sentence is in the past tense?a) The thunder is getting louder and closer by the minute; let's go inside!b) We will head for the basement as soon as we hear a tornado warning.Oc) Tropical storm Barney is expected to make landfall early tomorrow morning..d) Hurricane-force winds have blown the roofs off houses all over town. summarize how solid ground can take on the properties of a liquid Part A. Which of the following parts of citizenship are responsibilities, rather than rights? Select the two correct answers. A. obeying property laws B. speaking freely C. carrying weapons D. serving on juries E. appealing court decisionsPart B. Which rights are protected when the majority of citizens perform the responsibilities chosen in the previous question? Select the two correct answers. A. religion B. assembly C. speech D. property E. due process Can someone tell me what I should highlight for question number 1? Great art should create a feeling in the viewer. True False Find the Dy/Dx of y=7/x using first principle Mr. Hughes gave 5/14 of his savings to his son, 2/3 of the remainder to his daughter, and the rest to his wife.If his wife got $900, what were his savings? ye mere new id h yar yo id ban h 24 hours ke liye okmai suryansh vaishnav 79h mere puraine id ka name List out the uses of forest and wildlife. Choose the correct answer:-with regard to obstetric history:1. pregnancy is dated from conception 2. parity is the total number of pregnancies regardless of how they ended3. a previous history of pre eclampsia should trigger increased antenatal surveillance4. the last menstrual period is reliable if cycle is irregular Which of the following is not a way to avoid plagiarism? A.taking good notes, including noting the sourceB.going back and citing once the writing is completeC.using quotation marks around quotationsD.citing all paraphrasing and summarizing How is the setting from Ovid's Pyramus and Thisbe similar to Romeo and Juliet both take place in servants quarters? Dwight Donovan, the president of Fanning Enterprises, is considering two investment opportunities. Because of limited resources, he will be able to invest in only one of them. Project A is to purchase a machine that will enable factory automation; the machine is expected to have a useful life of four years and no salvage value. Project B supports a training program that will improve the skills of employees operating the current equipment. Initial cash expenditures for Project A are $108,000 and for Project B are $48,000. The annual expected cash inflows are $51,270 for Project A and $20,675 for Project B. Both investments are expected to provide cash flow benefits for the next three years. Fanning Enterprises desired rate of return is 6 percent. (PV of $1 and PVA of $1) Use appropriate factor(s) from the tables provided.)A. Compute the net present value of each project. Which project should be adopted based on the net present value approach?B. Compute the approx. internal rate of return of each project. Which one should be adopted based on the internal rate of return approach? If the perimeter is 20 what must be the length of the missing side length? (Answer with Number Only) * Our fingers have finger tips but our toes don't have toe tips yet we can still tip toe