1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
9

A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.

Computers and Technology
1 answer:
Anna35 [415]3 years ago
7 0
<span>A selective backup allows a user to choose specific files to back up, regardless of whether or not the files have been changed.</span>
You might be interested in
Why is it important to evaluate the website on which you plan to shop?
Otrada [13]
B. It may not be trustworthy,and you risk identity theft
6 0
3 years ago
Which best explains a password attached to a document?
Bess [88]

Answer:

Explanation:

Going through the options:

O Passwords typically are not case-sensitive.

Passwords are typically case-sensitive.

O Using a document to store the password is not allowed.

It is not recommended but definitely allowed to store passwords in document.

O If a user forgets the password, it cannot be recovered.

Lost password cannot be recovered easily but not impossible.

The only choice left is

O There is a private password for the user and a public one for the viewer.

It describes a set of public and private key password used to allow sharing of encrypted files between user and viewers.

So the only answer left which is correct:

O If a user forgets the password, it cannot be recovered.

6 0
3 years ago
Read 2 more answers
What are the challenges of Cyber Law???? Needed ASAP ​
lilavasa [31]

Answer:

Explanation:

Few challenges that the technology space faces in cyber security are the following:

Digital Data Threat: Growing online transactions generate bigger incentives for cybercriminals. Besides, establishments looking to mine data—for instance, customer information, results of product surveys, and generic market information—create treasured intellectual property that is in itself an attractive target.

Supply Chain Inter-connection: The supply chains are increasingly interconnected. Companies are urging vendors and customers to join their networks. This makes a company’s security wall thin.

Hacking: This action is penetrating into someone’s system in unauthorized fashion to steal or destroy data, which has grown hundred folds in the past few years. The availability of information online makes it easier for even non-technical people to perform hacking.

Phishing: The easiest to execute and can produce the results with very little effort. It is the act of sending out Fake emails, text messages and create websites to look like they're from authentic companies.

6 0
3 years ago
What will happen when you run this program?
Elenna [48]

Answer:

C. Infinite loop

Explanation:

num will be printed continuously since it will always be bigger than 0 (10 is greater than 0, satisfying the condition num > 0) making it an infinite loop since it will go on forever.

Hope this helps :)

4 0
3 years ago
It is a small hand tool used generally in decorative works such as making garnishes
SSSSS [86.1K]

it will probably be a channel knife

6 0
3 years ago
Other questions:
  • While driving you encounter an emergency vehicle stopped ahead. Discuss how the move over law applies to this situation and your
    13·1 answer
  • It will gain you more knowledge, intensify your soft skills, strong work ethics and grow your network. What is it?​
    12·2 answers
  • The most fundamental components of storage that users interact with are the:
    11·1 answer
  • Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s: Diameter (2
    7·1 answer
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • Instructions
    8·1 answer
  • What can i say back to my IT school lady?
    8·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • At a red traffic light, you must stop__
    12·2 answers
  • an existing technology that would allow users to transfer images from the camera to the computer without connecting them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!