Emergency is there any way to open a corrupt file off a zip drive?

1 Answer

Answer :

answer:My first approach would be to try a different USB port, then a different computer – better still if you can try it on a different OS (so, Mac if it didn’t work on a PC and vice versa). I’ve had some luck accessing files on Linux from a zip drive that didn’t work with Windows (and this was the same laptop). If that doesn’t work, you probably still have some options, but don’t do anything like reformat the zip drive – that will destroy the file for sure.

Related questions

Description : How do you restart a Vaio Windows Vista Business program with corrupt file?

Last Answer : First try startup repair, then come back and tell me what happened. Do NOT restore.

Description : How can I open a downloaded file in ZIP?

Last Answer : use the universal file manager - totalcommander, no need to install different one-time archivers. can be downloaded at slunecnice.cz (smoking)

Description : WinRAR corrupt MP3 file -CRC failed?

Last Answer : I can’t answer this question, but I have already sent it to some tech-sawy people on ask-public. Hang on!

Description : best (free) way to recover data on a corrupt ntfs hdd?

Last Answer : Search on www.download.com for “repair ntfs disk” and filter the results by selecting only free programs. HTH.

Description : Select the word which best expresses the MEANING of the given word. Vitiate (a) Corrupt (b) Viscous (c) Open (d) Praise

Last Answer : (a) Corrupt

Description : Corrupt OS X Leopard installation...

Last Answer : Without install discs, a fix may be impossible. You’ll need to boot from the install disc & run Disk Utility or take it in to the Apple Store for a fix.

Description : How to recover music off a corrupt ipod without restoring it?

Last Answer : Well there are professional data recovery centers but that could end up costing a couple thousand, maybe more maybe less. I can’t think of any software off hand that would work.

Description : What is a zip file ?

Last Answer : A zip file is a type of archive used for storing and distributing files. It can contain one or more files and folders. This is usually used to reduce the size of the file. However, it is also ... the download time of the project would be reduced due to the reduction in file size due to compression.

Last Answer : You WinZIP app By Android On the phone Any Zip To the file Easily Unzip To do You can. The app Download To do In the playstore Find out 3

Description : Which file in java uses zip compression? a) JAR b) JER c) ZAR

Last Answer : a) JAR

Description : Using gzip program an uncompressed file in the tar format is compressed in the zip format, by providing which extension ? a) tar b) tar.gz c) tar.gz d) zip

Last Answer : c) tar.gz

Description : From the following, which file format stores multiple files in a single Zip file ? a) zap b) zip c) zop d) zep

Last Answer : b) zip

Description : Which file format stores multiple files in a single Zip file ? a. zap b. zip c. zop d. zep

Last Answer : b. zip

Description : What is Zip File?

Last Answer : Have you ever pondered, What is a ZIP File? There are so many different types of files in computer terminology that it can get really confusing. A ZIP file is simply a file filled with ... and stored in the directory you specify and contains the files you chose to be included the ZIP file.

Description : What is Zip Drive ?

Last Answer : Developed by Iomega, these disks are three and a half inches in size like floppy disks, but they are thicker and have a data capacity of 100 megabytes. These are called zip disks. Zip Disk Drive is required to use Zip Disk.

Description : In the illustration, if one of the devices labeled 'TURB' should fail the ___________. EL-0003 A. device labeled 'EXC' will drive the alternator B. device labeled 'BKR' for that ... -alternator D. emergency generator should automatically start and be placed on line to supply emergency load centers

Last Answer : Answer: B

Description : Is it always safe to open zip files?

Last Answer : It’s pretty obviously some bullshit spam.

Description : Mac Users: What do you use to unzip .Zip and .Rar files?

Last Answer : The Unarchiver is what I use.

Description : Does archiving files and directories into ZIP or RAR enhance defragmentation?

Last Answer : No because writing and deleting files is what causes fragmentation. Especially writing such large files to an already fragmented disk. Just get Diskeeper and let it run in the background. It's a very ... have to do any tricks, or remember everything. My disks are never fragmented when I check them.

Description : Why is "7-Zip" better than "WinZip" for unzipping?

Last Answer : It handles a bunch of formats that WinZip doesn’t. I’ve used it for years, and I’ve never had an issue. It’s good stuff.

Description : Free zip program for Windows?

Last Answer : I like 7zip.

Description : Where are all the good cops condemning the actions of their corrupt, brutal and thug colleagues?

Last Answer : If you’ve done nothing wrong, you have nothing to hide. If you’ve got nothing to hide, you’ve got nothing to fear.

Description : Corrupt outlook express 6 inbox?

Last Answer : answer:

Description : Who wants to play Corrupt a Wish #2?

Last Answer : I wish I had a week off from work.

Description : Do you believe the majority of people who work at a certain job (police officer, insurance broker, banker for example) are corrupt?

Last Answer : I’ll put it out there and say that I believe that a majority of executives with large banking firms are corrupt and on the take from somewhere.

Description : Who wants to play Corrupt a Wish?

Last Answer : I wish I had a new car.

Description : Should there be different nouns for the state of being corrupt and the process of turning corrupt?

Last Answer : answer:I absolutely love this question, and share your dislike of the term corruption to describe the standard operation of an institution. It reminds me of when people say things like, Corporation x ... a deviation from the norm, the average population is ill-equipped to even know what this is.

Description : Does power corrupt?

Last Answer : If it doesn’t, it probably eventually blunts the sensibilities since people in power have more done for them and given to them without need of sensitive tactful negotiation. Eventually that could be damaging to character if one does not remain aware of it.

Description : Is it possible to retrieve the data from a corrupt SD card?

Last Answer : I suppose that it’s technically possible, but it would be pretty expensive.

Description : Do you think everybody is corrupt?

Last Answer : No – but I think everyone has an agenda. It just so happens that your agenda aligns with theirs on occasion so you view them as benign. Even altruism has a selfish component to it (improving a battered sense of self worth, perhaps).

Description : Corrupt/Incomplete downloads of archived Tomcat versions?

Last Answer : Gah! No help, eh? How bout this - attempt to download this - it should be ~10MB in size is it? - the filename should end with .tar.gz ... does it? - you should be ... archived version. - Mother bleeping sonuva beeyootiful crappity smackin' holy cat butter funky butt lovin' fiddlesticks!!!!!!!

Description : What % of cops do you think are corrupt? By this I mean that they r involved in criminal acts themselves.

Last Answer : answer:http://www.angelfire.com/ny2/bluewall/link9.html http://www.copwatch.org/drugs.html link Might not be what you were looking for, but all are quite interesting.

Description : What is the most corrupt sports league?

Last Answer : Olympics. Even FIFA looks at the IOC and says “Bruh”

Description : A masked man is being hunted by the authorities for his vigilante activities, in which he helps and protects innocent people. His modus operandi is to seek out injustices caused by corrupt and evil people, ... his visit. Who is this masked man, and what is the personal letter he delivers? -Riddles

Last Answer : The masked man is Zorro, and the personal letter he delivers to the villains he thwarts ----- is the letter 'Z'.

Description : I am not visible, tangible, or corrupt. I am genuine, given, and real. It takes three of these to figure out what is left. What am I? -Riddles

Last Answer : Right.

Description : ‘Democratic governments are attentive to the needs of people and less corrupt’. Do you agree to this point? -SST 10th

Last Answer : Democratic governments are expected to be attentive to the needs of people and the needs of the people and often ignore the demands of a majority of its population.Democracy is also not free of corruption. Our politicians are indulged in money making. Our top officials are also doing the same.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : what word fits in the blankMany corrupt politicians try to pass laws that ___._____.______ illegal immigrants from getting decent paying jobs or good housing?

Last Answer : the periods dont mean anything

Description : Which country is most corrupt?

Last Answer : Japan.awalys either got tsunami or earthquake

Description : Which is the least corrupt country ?

Last Answer : Denmark is the least corrupt country.

Description : Which is the most corrupt country ? ( According to the rank of 2019) ?

Last Answer : Somalia is the most corrupt country. (Source: Wikipedia)

Description : Which is the most corrupt country in Asia ?

Last Answer : North Korea is the most corrupt country in Asia.

Description : There is something about the msvcp120.dll file because on my old Xp machine this error message occurs when loading windows. I don't even have to start any programs. Pretty annoying. [img alt_text = 'msvcp120.dll is missing' description = ''] https:///wp-content/uploads/2016/11/msvcp120.png [/ img] 

Last Answer : I didn't encounter this problem with windows xp, but with win7, but I think the solution is the same. Locate the downloaded file and download and overwrite it in the system32 directory. 

Description : Who to contact to report a corrupt government agency?

Last Answer : If the problem is a whole agency, then that is a job for thepress to expose. But you will need absolutely solid proof.

Description : Why might Jackson have considered the outcome of the 1824 elections the result a corrupt bargain?

Last Answer : Andrew Jackson, the only great military hero from the War of 1812, won the most popular and electoral votes, but his electoral vote fell short of the required majority. As specified in ... named secretary of state, Jackson and his supporters almost immediately began organizing for the 1828 election.

Description : How does power corrupt in the story of Prometheus and pandora box?

Last Answer : At its core, the myth of Prometheus and Pandora is an attempt to explain how suffering first entered the world. It just goes to show you that people have been struggling with this question forever. Pretty much all the bad stuff that happens now happened way back in the day, too.

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks