1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
9

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

Computers and Technology
1 answer:
alekssr [168]3 years ago
3 0

Answer:

incremental

Explanation:

An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.

You might be interested in
Which of the following does not illustrate an effect of media on human communication?
Lyrx [107]

I'd choose B as the answer.

Our entire social lives these days are mediated and we are now leaving in a mediated era. Social media, for instance, has profoundly influenced in inter-personal communication. Options A and D contributes to the interaction and the fulfillment of peoples’ social needs and social media has become a preferred mode of communication with the rise of digital and mobile technologies. Social media has negatively impacted and reduced face to face interactions of human beings, whether business wise or through personal communication. Option C also illustrates an effect of media on human communication, which only leaves us with option B

3 0
4 years ago
A. which chip is thought to be the first microprocessor? how many transistors roughly did it use?
vaieri [72.5K]
A micro processor is an integrated circuit that have all the functions of a central processing unit of a computer.
The chip which is thought to be the first microprocessor is INTEL 4004. It was manufactured by Intel in 1971. Intel 4004 has 2,300 transistors. 
4 0
4 years ago
help:(What are the uses of various lights? How are they all different? How do you decide on their usage? How can you use natural
Monica [59]

Answer:

This is one of the most common types of lighting. Ambient light is a soft glow that blankets your space just enough for you to function without causing a harsh glare. In photography and cinematography, ambient light is considered the "natural light" within a room. In décor, ambient light is very similar, except you create the ambient light by making the room's lighting as natural and flat as possible. While ambient light is meant to get you safely from point A-to-B, it is not ideal for working closely with things or to highlight things around your space. When used correctly, ambient light creates a fantastic environment to relax from an overly stressful day or to have a warm conversation with an old friend. Ambient lighting is often referred to as mood lighting, because this light captures the soft curves of your face and allows your pupils to dilate slightly (a physical sign of affection). Some yoga studios have even begun using the softer ambient lighting in their classes to help draw stress from the body. This is a smaller more concentrated light. You want task lighting around when you’re working. In fact, some people call it office lighting. Task lighting is meant to help you see when you’re doing projects in which you need a finer light, such as, reading, cooking, writing, sewing and many other things. Task lighting only works well when it is used as a contrasting light. For example, if you have a low lit room with a swing arm lamp turned on over your desk, the light over the desk surface will be more effective with less glare or shadow-effect than if the entire room was lit with a brighter light. Task lighting helps naturally stimulate your brain. The contrasting light allows you to be more alert and concentrated. This will help you see more details as you work, creating higher quality results. This is why many businesses choose to use task lighting in their offices.

Explanation:

5 0
3 years ago
Illustrations that are converted from paper to electronic format are usually
KengaRu [80]

The answer is most definitely C: Scanned

In basic terms, a scan is as a result of a digitized printed document being converted from its paper form into digital data, and the work of a scanner is to scan and send the digitized pictures to your computer. A scanner reduces the time and labor to transform the information from printed materials to digital data.


3 0
3 years ago
Read 2 more answers
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
SIZIF [17.4K]

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

  • ‎DNS flood attack.
  • DNS tunneling.
  • DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: brainly.com/question/17273205

7 0
3 years ago
Other questions:
  • Alkane is a Variety of which fruit
    6·1 answer
  • Nina is explaining the SQA process to her friend Amanda.
    9·1 answer
  • Explain 5 service provided by Internet​
    6·1 answer
  • When you create new document, you have the option to create a blank document or a predifined
    7·1 answer
  • IPv6 is being developed in order to:
    15·1 answer
  • pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperatu
    5·2 answers
  • How do you chose a profile pic on brainly?
    8·1 answer
  • Question 1 (1 point)
    5·2 answers
  • How to transfer bookmarks from one computer to another.
    13·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!