1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
6

An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turn

ed on is called ____________.
Computers and Technology
1 answer:
Darya [45]3 years ago
5 0

Answer:

Time machine.

Explanation:

An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called a time machine.

OS X was released in 2001 and it's Apple's version ten (10) of the operating system that runs on its Macintosh computers.

A time machine is a software tool built into the Mac operating system and it is primarily designed to automatically backup user files or data onto a dedicated drive such as an external hard drive disk through a wired connection, by using a Thunderbolt or universal serial bus (USB) cable. The automatic backup can as well be done wirelessly through a network connection.

You might be interested in
. Briefly describe an SQL DML statement for storing new data into a table.
STatiana [176]

DML stands for Data Manipulation Language.

SQL DML statements consist of insert, update and delete statements.

Out of these three, insert is used to add new data to the table.

The update command modifies the existing data in the given table.

The delete command removes the data from the given table.

Syntax

INSERT INTO table_name ( column1, column2, …….. )

VALUES ( value1, value2, ……… )

The table_name represents the table in which data is to be inserted.

All the columns in the table_name need to be specified in the brackets in the insert into clause.

All the values in the values clause should correspond to the columns, both in the order in which the columns are mentioned and the data type of the values should match the respective column.

Example

Consider the table Person consisting of columns id, name, gender having data type integer, varchar and varchar, respectively.

In order to add data to all the columns of the Person table, the command is as follows.

Insert into Person ( id, name, gender )

Values ( 101, “Alexis”, “Male” );

In the above command, value is present for each column in the respective order. Also, the format of the data match the format of the columns.

Other versions of the insert command add data only to some columns in the table.

Insert into Person ( id, name )

Values ( 102, “Aayesha” );

The above command adds data only to two columns as mentioned.

Also, null value can be added using insert command.

Insert into Person ( id, name, gender )

Values ( 103, “Brainly dot com”, null );

Since null value appears at number three, the corresponding column to this value is also number three, i.e., gender column.

This inserts null value as the gender for Brainly dot com.

3 0
3 years ago
What is prototyping in system design phase? Under what condition this approach is most suited? Also what is the disadvantage of
Novay_Z [31]
Prototyping refers to the process of developing prototypes. Prototype model is most suitable for use when the desired system requires a lot of interaction with the end users. One of the disadvantages of prototyping is the extra funds that is spent on the development of the prototypes. Another disadvantage is the accuracy of the prototype. 
8 0
3 years ago
Davingould1115...................answer 1​
erma4kov [3.2K]

wt ...

I didn't get u..

is it a I'd

8 0
3 years ago
Read 2 more answers
What is the output of print str if str = 'Hello World!'? A - Hello World! ... Q 18 - What is the output of print list[1:3] if li
Elenna [48]
Is this some jiberish or is this a different language because I can’t understand nothing you just typed
6 0
3 years ago
In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Pr
Tasya [4]

Answer:

cyber attack

Explanation:

7 0
3 years ago
Other questions:
  • Which of the following devices electronically sorts mail by ZIP code? A. Fax modem B. Electronic organizer C. Optical character
    10·1 answer
  • At the Network layer, what type of address is used to identify the receiving host?
    10·1 answer
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • Within a major students can choose to study a specific area within major. For example a journalism student may study military jo
    8·1 answer
  • You can move to the previous or next sheet by pressing the ____ keys.
    12·1 answer
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • Is number 1 correct​
    7·2 answers
  • What is Product Owner work that a Product Owner might delegate?
    10·1 answer
  • Choose the words that make the following sentence true.<br> Primary memory is
    5·1 answer
  • QN, 3. Write the working principle of computer.<br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!