1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
7

a ____ is a duplicate of a file, program, or disk that you can use in case the original is lost, damaged, or destroyed.

Computers and Technology
1 answer:
AleksAgata [21]3 years ago
3 0
A backup is a duplicate of the file, program or disk that you can use in case the original is lost, damaged or destroyed.
You might be interested in
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Veseljchak [2.6K]

Answer:

Spoofing

Explanation:

Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source

5 0
2 years ago
Which IDEs support multiple high-level programming languages? Select all that apply.
rewona [7]

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

This question is about integrated development environments (IDEs) that support multiple high-level programming languages.

All mentioned IDEs such as Eclipse, Visual Studio, and Xcode support multiple high-level programming languages except Linux.

Using Eclipse, you can do Java programming easily and can build Java-based programs, and also you can do android programming in Eclipse while importing required android settings and libraries. Visual Studio is a Microsoft IDE, in which you can build desktop, web, and mobile, and windows phone app easily using high-level programming. Xcode is an integrated development environment for macOS containing a suite of software development tools developed by Apple for developing software for macOS, iPadOS, iOS, watchOS, and tvOS.

While Linux is not an IDEs, it is an open-source operating system based on Linux kernel.

8 0
3 years ago
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
Alonzo collects bugs. He has created a fascinating display of large insects. Collecting bugs is a(n) _____ to Alonzo.
-Dominant- [34]
The answer is hobby. He does it because he enjoys it. There is no information of him being told or paid to collect bugs, so it is a hobby.
3 0
3 years ago
Read 2 more answers
What is software infrastructure?
Setler79 [48]
Software-defined infrastructure (SDI) is the definition of technical computing infrastructure entirely under the control of software with no operator or human intervention. It operates independent of any hardware-specific dependencies and are programmatically extensible.
4 0
3 years ago
Other questions:
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • What is Microsoft first product
    6·2 answers
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    15·2 answers
  • What natural resource are available on the coast but not somewhereelse
    13·1 answer
  • How does virtualization factor into a layered vs. non-layered design discussion?
    14·2 answers
  • Assume that the int variables i and j have been declared, and that n has been declared and initialized.
    10·1 answer
  • "What line of code can be used to provide a convenient way to merge the source code from one file with the source code in anothe
    8·1 answer
  • Qwertyuiopasdfghjklzxcvbnm??
    14·2 answers
  • What is this?
    15·2 answers
  • or each array created, the name of the array becomes the name of the pointer constant created by the compiler for the array, and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!