1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
4 years ago
7

a ____ is a duplicate of a file, program, or disk that you can use in case the original is lost, damaged, or destroyed.

Computers and Technology
1 answer:
AleksAgata [21]4 years ago
3 0
A backup is a duplicate of the file, program or disk that you can use in case the original is lost, damaged or destroyed.
You might be interested in
The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
mafiozo [28]

Answer:

In the SOA tab of the zone's Properties dialog box, increase the refresh interval.

Explanation:

5 0
3 years ago
Which windows command always navigates the command-line interface back to the root directory?
Pie
The answer is "cd \".
5 0
3 years ago
What special member function of a class is called whenever an instance of a class is created and initialized?
allochka39001 [22]
It's called a constructor function, but it's name is the same as the class' name.
6 0
3 years ago
A student is taking a computer course in which there will be four​ tests, each worth 100 points. The student has scores of 92​,
MissTica

Answer:

He must score 86 or more in the fourth test to get and A

Explanation:

The needed score can be found with this equation

(92+88+94+x) = 360

274 + x =360

x = 360 - 274

= 86

x represents the fourth score, the sum of the four scores must be up-to 360 for the student to get an A

7 0
3 years ago
You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
salantis [7]

Home pc1 becouse it is the right one

3 0
3 years ago
Other questions:
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    8·1 answer
  • Welcome to Cypres...
    6·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • A project team was researching the risks involved in setting up a computer system. They decide to go ahead with their plan, rega
    7·1 answer
  • Completed the given flowchart using the algorithm steps which is given in wrong order. 1.Input time 2.Stop 3.Print "Good morning
    8·1 answer
  • Jane is creating a slide that will have a large heading and number of bullet points below it. What slide format should she use?
    12·1 answer
  • when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
    9·2 answers
  • Bradley is working on a program that uses different classes in specific relationships. Help him remember what these relationship
    14·1 answer
  • Create a statement that always returns the names of the three criminals with the highest number of crimes committed.
    15·1 answer
  • Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperati
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!