1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
7

Which action will help you protect data in your computer in case of an earthquake?

Computers and Technology
2 answers:
Len [333]3 years ago
8 0

Answer:

Explanation: 13

Jlenok [28]3 years ago
8 0

Back up and placing the back up away from earthquake location

Further Explanation:

Data protection is the main concern of all the computer users around the world. The data can be either damaged by the software programs developed by invaders or physical disasters. Physical disasters are inevitable. So in case of earthquake, following options can be considered to protect the data int he computer:

1. Taking a back up of data and placing the device containing back up at another location.

2. Upload a copy of the data onto the cloud so that it can be restored later.

Note: Both these are the precautionary actions just to reduce the risk of data loss during earthquake. There is no defined way to protect the data in computer while there is an earthquake in progress.

Learn more at:

  • brainly.com/question/9981560
  • brainly.com/question/10762715

#LearnwithBrainly

You might be interested in
As a digital strategist, Jared wants to add something extra to his ads to give users more incentive to click and convert. He's c
nadya68 [22]

Answer:

A) Up to 15 characters in each.

Explanation:

Total characters he can use in each of these optional paths are up to 15 characters in each.

6 0
4 years ago
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
What type of space is often the main focal point of the composition in graphic design
iogann1982 [59]

Answer: what are the choices?

Explanation:

3 0
3 years ago
Does anybody play nitro type
vlabodo [156]

Answer: Nah

Explanation: it kinda sucks and is a waste of time, play better games lol

3 0
3 years ago
Read 2 more answers
Load the we8there data set from the textir package. List the first 5 restaurants’ ratings from we8thereRatings. Based on we8ther
Readme [11.4K]

Answer:

> we8thereRatings[1:5,]

  Food Service Value Atmosphere Overall

1     5       5     5          5       5

2     5       5     5          5       5

5     5       5     4          4       5

11    5       5     5          5       5

12    5       5     5          4       5

3 0
3 years ago
Other questions:
  • What is a nonlinear presentation
    9·2 answers
  • A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology
    14·1 answer
  • So I’m doing a PowerPoint of how social media changed my life any ideas what I should right down and what kind of topics should
    11·2 answers
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • What is the definition of digital literacy?
    7·2 answers
  • A runtime error is usually the result of:
    9·1 answer
  • What is the central idea of the second section:
    14·1 answer
  • Consider the following code segment.
    5·1 answer
  • What is the importance of knowing the concept of programming?
    8·1 answer
  • What are two best practices for creating ads? (Choose two.) Select All Correct Responses Implement one ad per ad group per keywo
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!