1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
3 years ago
14

What are two statements that are true about using an external hard drive for backing up data

Computers and Technology
1 answer:
Naily [24]3 years ago
7 0
I don’t know xd I’m failing schooln
You might be interested in
Copyright laws were established :A. to allow authors to distribute their work while maintaining certain ownership rights. B. to
astra-53 [7]

Answer:A

Explanation:

Copy right is an intellectual property right granted by the government that gives the owner exclusive rights to use, with some limited exception, original expressive work.

3 0
4 years ago
Robot is an example of which generation computer?​
n200080 [17]

Robot is an example of Fifth Generation Computer.

I hope it's help you...

Thanks♥♥

6 0
3 years ago
Why does Linux make use of tasklets (i.e., software interrupts) instead of executing all interrupt-related activity in the (hard
Eddi Din [679]

Answer:

Although some devices can be controlled using nothing but their I/O regions, most real devices are a bit more complicated than that. Devices have to deal with the external world, which often includes things such as spinning disks, moving tape, wires to distant places, and so on. Much has to be done in a time frame that is different from, and far slower than, that of the processor. Since it is almost always undesirable to have the processor wait on external events, there must be a way for a device to let the processor know when something has happened.

That way, of course, is interrupts. An interrupt is simply a signal that the hardware can send when it wants the processor's attention. Linux handles interrupts in much the same way that it handles signals in user space. For the most part, a driver need only register a handler for its device's interrupts, and handle them properly when they arrive. Of course, underneath that simple picture there is some complexity; in particular, interrupt handlers are somewhat limited in the actions they can perform as a result of how they are run.

5 0
3 years ago
What are the two major types of sas steps?
QveST [7]

The two major SAS steps are data and proc.

SAS programming structure is based on two essential steps, Data and Proc.

1. The DATA step:

This involves collecting and uploading the essential data to the program memory. It is used to update, modify and edit the data in case of any errors once it has been added to a dataset. New datasets can be created from existing ones by updating, editing, and/or merging them. at the end of this step, SAS data sets are created.

2. The PROC step:

This step processes and analyses the data collected into datasets in the previous step. it is used to perform specific functions on the data. at the end of the proc step, a result or report is produced.

In a SAS code, each line of code should begin either with a DATA or PROC step.

<u>While the other options are incorrect because: </u>

<u />

  • Analysis: analysis is done in the PROC step.
  • Content: Data or content is collected in the DATA step.
  • Stat: a stat function acquires the status information regarding a specific file. Functions are performed on the datasets in the PROC step.
  • Run: This command is used to execute a code.
  • Import: Datasets are created by importing data from other datasets and outside.
  • Print: the report produced at the end of the PROC step can be printed as a hard copy.

You can learn more about SAS at

brainly.com/question/13615203

#SPJ4

8 0
2 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Other questions:
  • Nancy finds it difficult to locate emails in her Inbox. What action should she take to locate a particular type of email instant
    11·2 answers
  • 1. According to Rory's paycheck, he earned $800 last month, but before taxes and other deductions were
    12·1 answer
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • Which of the following is NOT a valid declaration for a character string?
    8·1 answer
  • Explain how class (static) variables and methods differ from their instance counterparts. Give an example of a class that contai
    7·1 answer
  • Can anybody answer this?
    13·1 answer
  • What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
    11·1 answer
  • Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write
    10·1 answer
  • Assignment 4: Evens and Odds
    11·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!