1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
15

What is the recommended procedure for disconnecting an external hard drive to avoid losing data?

Computers and Technology
1 answer:
Zina [86]3 years ago
3 0

Answer:

Instruct the operating system to eject the drive before unplugging it.

Explanation:

You might be interested in
You’ve just installed a software update, rebooted, and now your system experiences random crashes. Which too in Windows 8.1 enab
Usimov [2.4K]

Answer:

Action Center

Explanation:

The Action Center is a feature in window 8.1 that monitors security and maintenance on your computer.It notifies you when there is an issue.Through this user can view alerts and updates about software support problem.

5 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Which Excel file extension stores automated steps for repetitive tasks?
Marianna [84]

Excel Macros, or .xlsm, stores automated steps for repetitive tasks.

4 0
2 years ago
Read 2 more answers
Which of the following is a trend that began during the Vietnam War and continued with the Internet?
Blizzard [7]
<span>As far as I remember, this one - a. a move toward stricter control of mass-media communications by Congress and the FCC </span><span>is a trend that began during the Vietnam War and continued with the Internet.</span>
7 0
2 years ago
Network layer protocols specify the _______ structure and processing used to carry data between hosts.
kari74 [83]

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

3 0
9 months ago
Other questions:
  • Which functions are performed by server-side code??​
    10·1 answer
  • Finding your style in photography is about ___
    10·2 answers
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • Life can get busy and hectic but relationships matter what is an effective way to mending relationships that may have been negle
    9·1 answer
  • Which of the following tasks requires you to use the Tabs option?
    12·1 answer
  • What is the approximate area of the figure? A. 129 square inches B. 113 square inches C. 110 square inches D. 44 square inches
    15·1 answer
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • Using C, Write a program that reads a series of strings from standard input and prints only those strings beginning with the let
    8·1 answer
  • The file format is used for graphic files.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!