1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
4 years ago
7

A blank is a copy of one or more files that is made in case the original become lost or damaged

Computers and Technology
1 answer:
ankoles [38]4 years ago
3 0

Answer:

a copy or backup

Explanation:

You might be interested in
You can edit existing conditional formatting _____ from the conditional formatting rules manager dialog box.
Lera25 [3.4K]
I believe the term you're looking for would be "rules" 
send me a message if not true.
7 0
4 years ago
Write a program using python 3 that asks the user how many integers they would like to enter. You can assume that this initial i
mixer [17]

I've included my code in the picture below. Best of luck.

8 0
3 years ago
Given a member function named set_age() with a parameter named age in a class named Employee, what code would you use within the
BaLLatris [955]

Answer:

Explanation:

This would be considered a setter method. In most languages the parameter of the setter method is the same as the variable that we are passing the value to. Therefore, within the function you need to call the instance variable and make it equal to the parameter being passed. It seems that from the function name this is being written in python. Therefore, the following python code will show you an example of the Employee class and the set_age() method.

class Employee:

   age = 0

   

   def __init__(self):

       pass

   

   def set_age(self, age):

       self.age = age

As you can see in the above code the instance age variable is targeted using the self keyword in Python and is passed the parameter age to the instance variable.        

6 0
3 years ago
I need some help with this project. The picture of the assignment is above
Mekhanik [1.2K]

Answer:

sorry

Explanation:

you need to do this on your own Wahhabi

but if you sub to my you-tube channel at chris got ha,x i will help you out

6 0
3 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
nata0808 [166]

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

8 0
3 years ago
Other questions:
  • To display the control panel window, first right-click ____ and then click control panel.
    5·1 answer
  • What should you keep in mind when installing hard drives?
    5·1 answer
  • Which of the following is a way to prevent wastes from contaminating the environment? A) Use absorbent pads to collect floor was
    11·2 answers
  • How do you implement instruction level parallelism
    11·1 answer
  • Calculate the number of telephone
    5·1 answer
  • 3. Describe at least 3 nonprice competition strategies a company could use to convince customers that its product is better than
    5·2 answers
  • Which user interface part shows graphical output of mined data?
    8·2 answers
  • Which of these is a historic real-world simulation game?
    15·1 answer
  • In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.
    5·1 answer
  • Give an example of how loops are used in programming Kturtle​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!