1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
7

When you break an iPad, can you recover an iMovie?

Computers and Technology
2 answers:
kompoz [17]3 years ago
7 0
Yes, on your cloud. you should have an email 

melomori [17]3 years ago
6 0
Yeah it's automatically installed on I cloud
You might be interested in
A binary tree is full if all of its vertices have either zero or two children. Let Bn denote the number of full binary trees wit
Arlecino [84]

Answer:

(a) B_3 = 1\\B_5 = 2\\B_7 = 5

(b) See attached

(c) B_n = 2^{(n-3)/2}

Explanation:

7 0
3 years ago
Determine the Bcd equivalent 1100111110101001
Vilka [71]

Answer:

01010011000101100001

Explanation:

In computing and electronic systems, a binary-coded decimal (BCD) is a digital encoding method for decimal numbers in which each digit is represented by its own binary sequence.

8 0
3 years ago
What can you create best in Word Online?
RUDIKE [14]

Answer: USE GOOGLE CHARTS

Explanation:

5 0
3 years ago
Read 2 more answers
What are the means of hardware security?​
sdas [7]

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

5 0
3 years ago
Read 2 more answers
A network administrator attempted to access the company website and received a "page not found" error. The next day the administ
Iteru [2.4K]

Answer:

a DoS attack occurred

Explanation:

According to my research on information technology and cybersecurity, I can say that based on the information provided within the question he can conclude that a DoS attack occurred. This (denial-of-service) attack is when an individual sends a large amount of network authentication requests with an invalid return address and overloads a server until it crashes. Which is why the company website says "page not found". All of these requests are usually from a single computer, which is also why they all originated from the same IP in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Other questions:
  • Esther has acquired an associate's degree in information technology and certifications in PageMaker and Illustrator. Which caree
    8·2 answers
  • A _____ is a link on a web page that leads to another web page.
    13·1 answer
  • The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
    8·1 answer
  • Rows within a spreadsheet are identified by:
    8·1 answer
  • In Windows Vista, the Run command can be found in which application?
    6·1 answer
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
    7·1 answer
  • What does the internet engineering task force (IEFT) do?
    5·1 answer
  • doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
    9·1 answer
  • Inc AX,2 is valid in assembly language ?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!