1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
3 years ago
5

This procedure protects against the loss of data

Computers and Technology
1 answer:
Arte-miy333 [17]3 years ago
6 0
Data Backup and Recovery is the procedure that protects against the loss of data. It is to protect the crucial data against losing in events like physical disaster, database corruption, hardware failures, and other incident that can cause the data to lose.
You might be interested in
The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
stellarik [79]

Answer:

Yes, The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one.But the addressale fire alram system is more reliable than a conventional system.

Explanation:

Conventional systems are hardware-based and use analog technology. where addressable fire alarm use digital technology. addressable system is generally more reliable than a conventional system mainly due to how the different systems are wired. With a conventional system, if a device’s wire is damaged or severed, its signal and the signal of other devices down the line cannot be transmitted to the control panel.

With an addressable system, both ends of the wire connect to the control panel. Therefore, if one end becomes damaged or severed, signals can still reach the control panel through the other end of the loop. In addressable systems, a device can be removed or disabled and it will not affect the other devices in the loop.

7 0
3 years ago
What task did the u.s. government undertake that many people identify as the birth of the internet
blsea [12.9K]
The answer is a. the government developed a computer system to be used in military communications. It started in the 1960s and was developed and used to serve as communication without experiencing disturbances from bombs and gain security for military purposes. This was the time when ARPANET (Advanced Research Projects Agency Network) came into the picture. Soon it was opened to people starting from the 70s when emails were used and became more popular. It then paved for further development and largely contributed to technology and communication.
8 0
3 years ago
Read 2 more answers
17. Ano ang tawag sa pahina ng Excel?
kompoz [17]

D

Explanation:

D.spread sheet

........,,............:-)

5 0
3 years ago
Michelle is writing an assignment on programming language. Help Michelle complete the following statement that describes the inp
Oliga [24]

Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they <u>encounter the statements like the scanf() or gets() functions in the program.</u>

<u>Explanation:</u>

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

3 0
4 years ago
Which design principle is the subject of a photo or image?
MakcuM [25]

Answer:

B) Framing is the answer to your question

8 0
3 years ago
Other questions:
  • Successful attacks are commonly called ________. a. security incidents b. countermeasures c. both a and b d. neither a nor b
    10·1 answer
  • What is the difference between chrome and chromium browser?
    9·1 answer
  • I need help someone please help
    6·1 answer
  • LITERALLY PLS ANYONE!!! 90 pointsss!
    7·2 answers
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • Create a script that asks for the student's percentage point through a prompt box. Using the following scenarios write if else s
    5·1 answer
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are
    9·1 answer
  • #Question 4: #Use a variable to represent the name of a food. You are then going to print this variable four times. Before you d
    6·1 answer
  • "The constructor signature is defined as the constructor __________ followed by the __________. (3 points)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!