1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
9

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

Computers and Technology
1 answer:
alekssr [168]3 years ago
3 0

Answer:

incremental

Explanation:

An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.

You might be interested in
What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
Mashcka [7]

Answer:oof

Explanation:

4 0
3 years ago
Read 2 more answers
You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
vredina [299]
First, rpm is RedHat Package Manager. Compilation is done with gcc, the GNU C Compiler.

To add that kernel to grub2's menu, as root you'd need to run:

grub2-mkconfig > /boot/grub2/grub.cfg #redirection is favored by Red Hat

Check out the man page @ man grub2-mkconfig
5 0
3 years ago
Which role involves designing and creating advertisements for marketing purposes?
satela [25.4K]

advertising designers

5 0
3 years ago
You select a database or change to a different database with the ____ function.
saw5 [17]
The USE statement switches to a different database.
8 0
3 years ago
From an IT perspective, which of the following best describes BI and BI apps?
Natali5045456 [20]

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).

4 0
3 years ago
Other questions:
  • ________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha
    10·1 answer
  • IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive d
    7·1 answer
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • Which are among the ways you can use bitlocker encryption? (choose all that apply?
    5·1 answer
  • Why save html documents as lowercase.?
    9·1 answer
  • Which type of image uses lossy compression to reduce file size?
    14·1 answer
  • Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new ar
    5·1 answer
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • Please help me on this please i am giving all of my points so please help me
    6·1 answer
  • What is System Testing
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!