1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
7

What is the recommended procedure for disconnecting an external hard drive to avoid losing data??

Computers and Technology
2 answers:
SpyIntel [72]3 years ago
6 0
Go to files than click on USB file then do eject device before taking it out
Nutka1998 [239]3 years ago
4 0
<h2>The correct answer is option <u><em>B.</em></u></h2>
You might be interested in
Computers that are close to one another are connected to form a LAN
Archy [21]

Explanation:

different computer are connected to a LAN by a cable and an interface card

6 0
3 years ago
How does a cat get out of a bush?
Alex17521 [72]

Answer:

that lil mf crawls through the bush

Explanation:

hes fast ngl

7 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Which of these lights is NOT part of the standard three-point lighting setup?
Contact [7]

Answer:

i believe background lighting

8 0
2 years ago
Combination of two or more networks
bezimeni [28]
The combination of two or more networks is internet work!!
Hope this helps
4 0
2 years ago
Other questions:
  • How useful is the creation of folders for your computer
    9·1 answer
  • Want is the assignmment
    8·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • Write and run a Python program that asks the user for a temperature in Celsius and converts and outputs the temperature in Fahre
    10·1 answer
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • There will be 10 numbers stored contiguously in the computer at location x 7000 . Write a complete LC-3 program, starting at loc
    14·2 answers
  • In your opinion is it more beneficial to have many folders or is it better to nest subfolders
    12·1 answer
  • Write a Java program that has a static method named range that takes an array of integers as a parameter and returns the range o
    10·1 answer
  • How are &lt; embed &gt; tags used in web page creation?
    5·1 answer
  • Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!