1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
11

Which recovery method allows users to back up their personal files to an external drive or network share without administrative

assistance?
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
8 0

Answer:

File history

Explanation:

File history recovery method  allows users to back up their personal files to an external drive or network share without administrative assistance. File History is a backup program that holds your personal files saved in the directories archives, desktop, favorites, and Contacts. It searches the file system regularly for changes, and copies modified files to a different location.

You might be interested in
The readline method reads text until an end of line symbol is encountered, how is an end of line character represented
zhannawk [14.2K]

Answer:

\n

Explanation:

readline() method is used to read one line from a file. It returns that line from the file.    

This line from the file is returned as a string. This string contains a \n at the end which is called a new line character.

So the readline method reads text until an end of line symbol is encountered, and this end of line character is represented by \n.

For example if the file "abc.txt" contains the lines:

Welcome to abc file.

This file is for demonstrating how read line works.

Consider the following code:

f = open("abc.txt", "r")  #opens the file in read mode

print(f.readline()) # read one line from file and displays it

The output is:

Welcome to abc file.    

The readline() method reads one line and the print method displays that line.                        

3 0
3 years ago
Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al
UNO [17]

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

5 0
3 years ago
If you are in a crash where you are at fault and injuries have occurred, the Financial Responsibility Law requires you to have b
ki77a [65]
Yes. If you are in an accident you must carry your insurance. It is required by law to have insurance.
3 0
3 years ago
Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
nataly862011 [7]

Answer:

Explanation:

In this particular example, these three healthcare companies using a public cloud because the companies share the resources.

They are using the model IaaS (Infrastructure as a service) this mean an external company is sharing their resources to this three companies, they can store data in this model, Infrastructure as a service gives you the highest level of flexibility and management control around your IT resources, is the best benefit in this model, you buy only what you need.

8 0
2 years ago
Explain why it is important that software products are developed and delivered quickly. Why is it sometimes sensible to deliver
Mkey [24]

Answer:

The reason why software products are developed and delivered quickly is because  

  • most of the time client cannot wait an extended time for the merchandise to be developed and delivered because the delay in delivery of software products might cause a loss for the client if that specific software is being developed for the client's business solution.  
  • In some mission-critical applications like defense systems, space research systems in such cases software must be delivered as quickly as possible because the project which is getting into such area cannot await an extended time for a software package to be delivered as here time constraint is involved and delay in at some point might cause a loss for an entire ongoing project.

Explanation:

Sometimes sensible to deliver an unfinished product then issue new versions of that product after delivery because

  • Sometimes the software that has got to be developed could be very big which isn't possible to develop during a shorter time and even client cannot wait an extended time for he's software in such case only the primary main core functionality of the software is being developed and delivered to the client and in later version remaining functionality's are included and delivered.

  • Even it is often the case that software that has got to be developed is very complex and should get lots of obstacles during development in such cases also only the core functionalities are being developed and delivered and in later version remaining functionality's are included.

3) Presence of bugs in software may also lead to issue a new version of that software after delivery and then fix the bug and deliver the new version to the client.

5 0
3 years ago
Other questions:
  • Compute the bitwise XOR between 10010100 and 11101010.
    12·1 answer
  • reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the
    5·1 answer
  • The calls radioed to patrol officers, or assignments given to police patrol units by 911 dispatchers, reveal the types of proble
    9·1 answer
  • Describe the major research, discoveries, or impact Timothy Berners-Lee has made on the scientific community. 100 points for ans
    6·1 answer
  • Gina is driving her car down the street. She has a teddy bear sitting on the back seat. A dog runs in front of Gina's car, so sh
    15·2 answers
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Name the major types of computer systems from slowest to fastest. ​
    9·1 answer
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
  • An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the f
    14·1 answer
  • Windows is a GUI Operating System, what is the other type?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!