1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
4 years ago
6

Donnell backed up the information on his computer every week on a flash drive. Before copying the files to the flash drive, he a

lways ran a virus scan against the files to ensure that no viruses were being copied to the flash drive. He bought a new computer and inserted the flash drive so that he could transfer his files onto the new computer. He got a message on the new computer that the flash drive was corrupted and unreadable; the information on the flash drive cannot be retrieved. Assuming that the flash drive is not carrying a virus, which of the following does this situation reflect?
a. Compromise of the security of the information on the flash drive
b. Risk of a potential breach in the integrity of the data on the flash drive
c. Both of the above
d. Neither of the above.
Computers and Technology
1 answer:
lubasha [3.4K]4 years ago
3 0

Answer:

b. Risk of a potential breach in the integrity of the data on the flash drive

Explanation:

The corrupted or unreadable file error is an error message generated if you are unable to access the external hard drive connected to the system through the USB port. This error indicates that the files on the external hard drive are no longer accessible and cannot be opened.

There are several reasons that this error message can appear:

  • Viruses and Malware affecting the external hard drive .
  • Physical damage to external hard drive or USB memory .
  • Improper ejection of removable drives.
You might be interested in
Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
Mkey [24]

Answer: Predetermined Overhead Rate, Estimated Manufacturing Overhead and Annual Activity Level.

Explanation:

Generally speaking, manufacturing overhead is applied to production by means of a predetermined overhead rate, which is computed under the general formula of dividing estimated overhead rate by some measure of the annual activity level.

A predetermined overhead rate is usually calculated at the beginning of an accounting period. It is calculated by dividing the estimated manufacturing overhead by an activity driver (e.g machine hours).

5 0
3 years ago
Read 2 more answers
The movement of the economy through highs and lows is referred to as:
skad [1K]

Answer:

the business cycle

Explanation:

5 0
3 years ago
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
HELP!!!
aleksley [76]

Answer:

The detail answer of this question is given in explanation section.

The simple answer is option B

Explanation:

Let took at each option:

A) an html tag

An html tag is used to start and end html document. It does not have anything to do with rendering.

B) a doctype declaration

The document type declaration is necessary because it tell the browser which version of html should be rendered.

C)Body tag tell the browser. it is the visible area of website.

D) A hear tag is used to clear meta data about website.

3 0
3 years ago
Read 2 more answers
The PowerPoint view in which you can edit the slide master is called ______________.
nirvana33 [79]

Answer:

it's slide master view.

8 0
3 years ago
Other questions:
  • Henry bought a new card for capturing television on his computer. When he finished going through the packaging, though, he found
    5·1 answer
  • if there are several web pages that you visit regularly what can you do to make accessing them more efficient?
    13·1 answer
  • Trojan Horse is a malicious program and a virus is a program. <br><br> a. True <br> b. False
    6·1 answer
  • Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys
    8·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • HELP ILL MARK BRAINLIETS!! What kind of statement is used to determine which path a program will take? priority statement
    8·2 answers
  • Question # 2
    7·1 answer
  • Please help!!
    6·1 answer
  • P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?
    8·1 answer
  • Help me with this two questions please
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!