1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
6

You’re using Disk Manager to view primary and extended partitions on a suspect’s drive. The program reports the extended partiti

on’s total size as larger than the sum of the sizes of logical partitions in this extended partition. What might you infer from this information?
a. The disk is corrupted.
b. There’s a hidden partition.
c. Nothing; this is what you’d expect to see.
d. The drive is formatted incorrectly
Computers and Technology
1 answer:
Sever21 [200]3 years ago
6 0

Answer:

<em>b. There’s a hidden partition. </em>

Explanation:

The hidden partition <em>is a separate section set aside on OEM computer hard drives, often alluded to as the recovery partition and restore partition.</em>

This portion of memory is used by the manufacturer to preserve the data used to restore your computer to its default settings.

This function is particularly useful as it does not involve the CD or DVD of the operating system.

You might be interested in
Are you allowed to copy and paste answers on brainy to give answers to other people?
Zanzabum
I’m pretty sure you can; or u can also screenshot n send, which is what i usually doooo
7 0
3 years ago
Read 2 more answers
Ideation includes all of the following EXCEPT
chubhunter [2.5K]

i believe it would be either C or D im sorry i dont know the exact answer

5 0
3 years ago
Find the area of the regular hexagon below by using the area formula for triangles.
mojhsa [17]
I think the answer is B. Because if you multiply 6x8 it’s 48 divided by 2 equals 24
5 0
3 years ago
What do work places allow a company to do
anygoal [31]
D. They provide a platform for collaboration
8 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Other questions:
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • Tommy has hired a marketing company to create a billboard advertisement
    11·2 answers
  • Can I change my brainly username?
    9·2 answers
  • Application Software include programs like: MS Word, Google Docs, MS Exce ect...
    13·1 answer
  • The idea behind ____ is that the peripheral can simply be plugged in and turned on, and that the computer should dynamically rec
    10·1 answer
  • What feature of a word processing program helps you to easily check and correct spelling mistakes?
    9·1 answer
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor
    14·1 answer
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!