1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
11

You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you

must refresh the entire installation. What do you do first
Computers and Technology
1 answer:
love history [14]3 years ago
8 0

Answer:

Make every attempt to recover the data

Explanation:

If your decide to format the drive, use system restore or reinstall the windows OS you may end up loosing all your data so the best option is to try as much as you can attempting to recover the data because the data might or definitely will be lost while using other options you think are available.

You might be interested in
You are implementing tactical activities to achieve the incident objectives. What is the correct title of the ICS organizational
notka56 [123]
The question needs to have choices. Nevertheless, it is still answerable.
The correct title of the ICS organizational element you are assigned is Operations Section, where you are implementing tactical activities to achieve the incident objectives.
8 0
4 years ago
A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology
Black_prince [1.1K]
<span>A switch is a central network device that connects network nodes such as workstations and servers in a physical Star topology</span>
8 0
4 years ago
A favorite pastime of information security professionals is ____, which is a simulation of attack and defense activities using r
GenaCL600 [577]

Answer:

war gaming

Explanation:

Wargaming in hacking is a cyber security challenge where competitors must exploit or defend a loophole/vulnerability in a system or application or gain or prevent access to a particular computer system, it is in a form of competition but it really helps them in securing systems/application when it arises.

5 0
4 years ago
1) Create a recursive program that prompts the user for a nonnegative integer N and outputs. a) Sum [N] b) BiPower [N] c) TimesF
Georgia [21]

Answer:

//Code is created using java

import java.util.*;

// returns the sum

public int sum(int N)

{

if(N==1)

return (1);

else

return N+sum(N-1);

}

// code to return the Bipower ouput

public int BiPower(int N)

{

if(N==1)

return (2);

else

return 2*BiPower(N-1);

}

// Code to return TimesFive output

public int TimesFive(int N)

{

if(N==1)

return 5;

else

return 5 + timesFive(N-1);

}

public static void main(String args[])

   {

//Prompts the user to enter a nonnegative integer

       int N  = Integer.parseInt.(console.readLine("Enter a nonnegative integer:  "));

//Outputs the sum, Bipower and TimesFive

       System.out.println(sum(n));

       System.out.println(BiPower(n));  

       System.out.println(TimesFive(n));

   }

}

4 0
3 years ago
8. If you, or someone you know is a victim of cyber-bullying what should you do? not say a word ,write mean things back ,report
bearhunter [10]

Answer:

report it

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • 4. When determining the tone of their tweets, marketers should consider
    8·1 answer
  • How come the UAC pops up EVERY TIME after i gave it permission to make changes to my PC
    6·1 answer
  • 100 students were asked to fill out a form with three survey questions, as follows: H: Honor Roll C: Club membership (Robotics C
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • Write a program that creates a map containing the U.S. states as keys, and their capitals as values. (Use the Internet to get a
    7·1 answer
  • RAM that can be changed. True or False
    9·2 answers
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • What program we write for nested if in c++ to print something after else part but before inner if else
    14·1 answer
  • The position of an element in the periodic table depends on​
    8·1 answer
  • The term ________ refers to the enormous amount of information that firms now have access to but cannot handle using conventiona
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!