1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
4 years ago
7

Which memory device is most appropriate for backing up a computer’s hard drive?

Computers and Technology
1 answer:
Luba_88 [7]4 years ago
4 0
It depends on how much storage. I usually connect mine to another hard drive.
You might be interested in
Fill in the blanks:
Temka [501]

Answer:

Explanation:

Since this is a fill in the blanks question, I will rewrite the sentences and make the answers bold and underlined for ease of access. Hope it helps.

1. A worksheet is made up of <u>cells</u> organized in a grid of rows and columns.

2. A <u>Cell Address</u> describes the location of a cell based on its column and row location.

3. A(n) <u>Absolute reference</u> refers to a fixed cell location that never changes.

4. Rows are typically represented by <u>Numbers</u> and contain data for individual records.

5. The <u>Format</u> of a worksheet defines its appearance.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
Nevermind- I figured it out.
posledela

Answer:

I'm sorry if I wasn't here to help you, but I'm glad you solved it ;)

Explanation:

3 0
3 years ago
HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn
loris [4]

Answer: D, C, E, are the answers! good luck.

Explanation:

5 0
3 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packet
murzikaleks [220]
Idk idk idk idk idk idk
8 0
3 years ago
Other questions:
  • What are the two major categories of computer software? word-processing software and spreadsheet software applications software
    13·1 answer
  • The most accurate reading that you can take on an analog vom are when the meters pointer is at the?
    5·1 answer
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • What is the film format that many filmmakers feel is superior to any other format?
    13·1 answer
  • FREE POINTS AND BRAINLIEST!!!<br><br> You guys are welcome. :)
    15·2 answers
  • What did Aristotle teach?
    6·2 answers
  • Explain why it is wise to remember your social security number
    15·2 answers
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
  • in a client server architecture what are the three propoerties of a client and three properties of a server
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!