1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
5

A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged

.
Computers and Technology
1 answer:
Ksivusya [100]3 years ago
8 0

Answer:

Backup.

Explanation:

The Backup process is used for the recovery process. When the originals file becomes lost or damaged then we can recover the file by the process Backup if a user copy of one or more files or into the entire storage devices. In the computer system, the storage device may be any drive, Pen drive, etc.

Data backup feature is available in the computer system even in the recycle bin it acts as a backup of any files.    

You might be interested in
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
4.8% complete this is a single choice question; skip ahead to question content a b c d confirm difficulty level: moderate an int
PilotLPTM [1.2K]

Answer:

A replay attack

4 0
2 years ago
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
The word blog is made from what two terms?
mafiozo [28]
• web + log = blog •
3 0
4 years ago
Why can't we sign up to brainly.com??????????????????
LiRa [457]

Answer:

Explanation:

so why are you doing sign up

8 0
3 years ago
Other questions:
  • ____ is an object-oriented programming language from Sun Microsystems which allows small programs called applets to be embedded
    13·1 answer
  • Which organization safeguards americans from health, safety, and security hazards and threats?
    14·2 answers
  • (a) Convert to hexadecimal: 1457.1110. Round to two digits past the hexadecimal point.
    8·1 answer
  • You want to divide the value in cell D3 by the value in cell E3. Which formula should you use?
    11·2 answers
  • Which are two main areas of the properties inspector
    7·1 answer
  • I AM GIVING BRAINLEST!!!!!!!!
    14·2 answers
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Is the most important characteristic of a hard drive.​
    7·2 answers
  • You are the IT administrator for a small corporate network. The employee in Office 2 is setting up a virtualization environment
    10·1 answer
  • How many accelerometers are there in an IRS system?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!