1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
6

You’re using Disk Manager to view primary and extended partitions on a suspect’s drive. The program reports the extended partiti

on’s total size as larger than the sum of the sizes of logical partitions in this extended partition. What might you infer from this information?
a. The disk is corrupted.
b. There’s a hidden partition.
c. Nothing; this is what you’d expect to see.
d. The drive is formatted incorrectly
Computers and Technology
1 answer:
Sever21 [200]3 years ago
6 0

Answer:

<em>b. There’s a hidden partition. </em>

Explanation:

The hidden partition <em>is a separate section set aside on OEM computer hard drives, often alluded to as the recovery partition and restore partition.</em>

This portion of memory is used by the manufacturer to preserve the data used to restore your computer to its default settings.

This function is particularly useful as it does not involve the CD or DVD of the operating system.

You might be interested in
Kim agrees. You get the equipment from the truck and begin working. Kim approaches you as you are installing the modem and is a
Angelina_Jolie [31]
Ask your friends if they are doing something wrong with your friends and friends
6 0
2 years ago
Explain the term computer output​
fomenos

Answer:

Computer output simply put is any data generated by the computer or feedback gotten from the computer. Output can take many forms, but there are 2 major categories:

- Soft copy output e.g text viewed on a computer screen

- Hard copy output e.g printouts

Explanation:

6 0
3 years ago
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. bastion host tra
devlian [24]

Answer: Bastion host

Explanation: Bastion host is type of computer which resist the attacks happening on a network particularly. It mostly works between the internet and interior network. It assures that the interior computer network remains undamaged due to any type of threat. It can also be considered that bastion host behave as the gateway between internal network and firewall as well.

4 0
3 years ago
Which of the following are not valid assignment statements? A) total = 9;
never [62]

Answer:

The correct option for the given question is option(b) i.e 72 = amount;

Explanation:

In the option(a) the total variable store the value 9 which is a valid assignment  

In the option(b) 72 is not a variable because the variable will never start with a numeric number. Therefore it is not a valid assignment statement.

In the option(c) the yourAge variable store the value of myAge variable which is a valid assignment.

So correct answer is an option(b).

7 0
3 years ago
After attempting the warm-up exercises suggested by the author, describe how they made you feel. Do you feel more relaxed or
Elena-2011 [213]

First of all is there supposed to be a picture added to the question? Like with the warmups. If not then ig ill try to answer yor question without them.

If your doing vocal warmups like i do in choir it opens up your pipes so when your singing you can hit all your nots cause you vocal chord are warmed up. Thats the same for talking

7 0
3 years ago
Read 2 more answers
Other questions:
  • As the driver it is not your responsibility that you are focused on the driving task with any possible distractions minimized. T
    9·2 answers
  • In which of the following situations may you pass on the right
    13·2 answers
  • A(n) ____ is a request for specific data from a database.
    9·1 answer
  • When you’re in the Normal view, what are the visible panes?
    15·2 answers
  • Markup is best defined as
    11·1 answer
  • A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
    7·1 answer
  • The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
    8·2 answers
  • What is the effect of persistence of game worlds in social video games?
    14·2 answers
  • Help!! Best answer will get Brainliest!!
    10·2 answers
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!