1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
5

a user has a large amount of data that she or he needs to store. the data will not be accessed regularly, but still needs to be

available for future use and preference
Computers and Technology
2 answers:
Flura [38]3 years ago
6 0
You need a sd card so you can store it and use it later
yawa3891 [41]3 years ago
5 0
You can use an external hard drive or sss
You might be interested in
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Which process centers the spreadsheet's content on the page?
riadik2000 [5.3K]
The answer is C: Select the horizontally boxes and vertically boxes in the margins tab of the page setup menu
6 0
3 years ago
The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat
levacccp [35]

Answer:

A key field is used to uniquely identify each record for retrieval or manipulation.

Explanation:

In a database there are many, having similar entities. So in order to differentiate each entity from other we need to set a key field among all the field which is always unique for each entity.

For example:

In a database of a company having data about its employees, the key field might be their ID. As some employees can have same names, addresses, phone numbers but cannot have the same ID.

5 0
3 years ago
What is the difference between a rack and a tower?
mash [69]

Answer:

A rack is a metal frame used to hold various hardware devices such as servers, hard disk drives, modems and other electronic equipment.

A tower is a metal chassis that holds all of the computer's components.

I hope this helped you !

3 0
3 years ago
Question 4 / 5
kkurt [141]

Answer:

it can damage you liver. and you can drink to much and bleed inside.

4 0
3 years ago
Other questions:
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    6·2 answers
  • Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?
    15·1 answer
  • In Florida, you can drive a motorcycle if you have a _____.
    8·1 answer
  • Write a python program that requests a word (with lowercase letters) as input and translates the word into pig latin. The rules
    15·2 answers
  • Ad identifies and describes at least four ways to prevent downloading of spyware, adware, and viruses to computer
    9·1 answer
  • From which of the following locations can you run a single line of the program?
    12·1 answer
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
  • Give an example of what Artificial Intelligence application most popular is used on a daily basis.
    12·2 answers
  • In windows 10, where would you save the template so it is available in the available templates list in backstage view?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!