1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
7

ou and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are

ready to watch the movie, you can't find it on your computer. You try to locate the second hard drive, and it is no longer listed in Windows. What might be the problem with the movie and the hard drive?
Computers and Technology
1 answer:
goldenfox [79]3 years ago
8 0

Answer: Virus attack or hard drive crash.

Explanation: In the event of this happening there are two possible things that has likely happened.

Virus Attack : There might have been a virus attack on the device.

Hard drive failure or crashing: The hard drive has failed or crashed.

Solution: You can try to reformat the system to handle any case of possible virus. Also ensure you check your hard drive too.

You might be interested in
The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
dolphi86 [110]

Answer:

B

Explanation:

Because you do not want to make your presentation be dark especially in a low lighted room.

(Certified MOS 2016 Powerpoint User)

8 0
3 years ago
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
mars1129 [50]

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

6 0
3 years ago
Describe an effective policy.
emmasim [6.3K]

Answer:

 An effective policy is the procedure that are manually clear and easy to understand in an organisation. It basically define as the set of rules and principles in a system to guide the decision and fulfill their desired goals.

An effective policy is error free and has high efficiency. Basically, it is the set of various ideas that can be used for decision making.

Some of the effective policies are:

  • The idea and plan are tested before its implementation in the system.
  • The result should be efficient and in measurable terms.
  • The ideas and assumptions are explicit in the nature.
6 0
2 years ago
The conceptual phase of any system or just the software facet of a system best describes the sdlc
geniusboy [140]
I think its the systems investigation phase.
5 0
3 years ago
A confidential number used as an authentication factor to verify a user’s identity is called a:
damaskus [11]

Answer: (A) PIN

Explanation:

 PIN is the personal identification number which is basically used to verify the identity of the users. It is confidential number which is used as the authenticating factor.

The PIN is the combination of the number that is also use to authenticate the banking system with the users.

On the other hand, the other given options are incorrect because these are not used to identify the users identification process.

Therefore, Option (A) is correct.

8 0
3 years ago
Other questions:
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • Write thanks to the IT teacher at the end of grade 5
    7·1 answer
  • WHAT DOES THE TRANSPORT LAYER USE TO MAKE SURE THAT A MESSAGE IS REASSWMBLED CORRECTLY ON THE RECEIVING DEVICES?
    6·1 answer
  • Weather satellites orbit Earth at an altitude of 1,400,000 meters. What is this altitude in kilometers?
    7·1 answer
  • A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ______
    15·1 answer
  • What are html documents also called?
    12·1 answer
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • Compare and contrast system software and generalised software
    11·1 answer
  • Out-of-order instruction execution can cause problems because a later instruction may depend on the results from an earlier inst
    6·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!