1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
6

jack lost all the data he saved on his desktop because of power outage while working on a presentation. on which of these comput

er components must jack have saved his data
Computers and Technology
2 answers:
Nesterboy [21]3 years ago
8 0
Hard drive that im sure


Bumek [7]3 years ago
7 0

Answer:

Hard Drive

Explanation:

A hard disk is the main memory bank of a computer. All the important files must be storaged there. But if you lose it, your computer will not remember how to do anything, and you will lose all your data. This is why protecting the hard drive is important. But most people save years worth of working on their hard drives and think nothing about protecting or saving it until it's too late. Rather than spending hours, weeks, or even months recovering from losing a hard drive, save your work and make a backup copy.

You might be interested in
Web browsers are used to browse the world wide web.
VikaD [51]
No its actually used for looking up concerns, questions, or rumours
3 0
3 years ago
Read 2 more answers
You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
Varvara68 [4.7K]

The most effective way to convey your marketing message is to use the channel and media most used by your potential audience.

To discover the most effective channels and means to reach your audience, market research, online traffic study and other strategies to identify the habits and customs of your target market can be carried out.

A marketing message must be written in a way that engages consumers, creates value and desire for your product or service.

Relationship marketing is a strategy used by companies to create greater proximity and identification of the public with an organization through messages that generate greater value than just advertising, such as the use of blogs, tips, humor elements and other ways to engage the consumer to relate to the company in the language and perspective of the media where the message was conveyed.

The message effectiveness monitoring program is also essential for analyzing the effect of advertising on consumers, through publication traffic, number of visits, hours, number of clicks on the page, etc.

These message tracking programs are effective so that the marketing team can analyze, review and improve their communication through the data and information obtained.

Learn more here:

brainly.com/question/3100288

7 0
2 years ago
The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
Bingel [31]

Answer:

Inventory errors can cause mismatches between the real numbers of the company, to avoid this you must use software that allows you to avoid these errors.

Explanation:

There is <u>software that line</u> (in the cloud), which is not necessary to install directly on a laptop or server.

Software examples for optimal inventory management:

1. ERP software in the cloud (it is an enterprise resource planner), it is flexible and low cost.

2. my MANAGEMENT

3. Crol

4. bind ERP (for SMEs)

5. Cloudadmin

6. Multi-commerce (license required).

6 0
2 years ago
Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
Paha777 [63]
<span>Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: Malicious code
Malicious code is often created to steal some information from another user without they realizing it, such as address, credit card number, social security number, email password, etc.</span>
4 0
3 years ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
Other questions:
  • Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
    12·1 answer
  • which of the following is a component of a rope-rewind starter system? a. a recoil spring c. an air vane governor b. a wrist pin
    5·1 answer
  • You are tasked with accumulating survey data on a web page and are responsible for it being free from dirty data once you close
    11·1 answer
  • The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that integrates the inf
    15·1 answer
  • In the cis configuration, the methyl groups are placed _____.
    8·2 answers
  • Which symbol is at the beginning and end of a multiline comment block? ### &amp;&amp;&amp; %%% """
    14·1 answer
  • What is output?
    13·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • Please select the word from the list that best fits the definition Asking for review material for a test
    14·2 answers
  • Another term for the plot structure of the hero journey
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!