1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
4 years ago
15

When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo

r operations. Assuming storage limitations, which of these is LEAST important to back up?
Computers and Technology
1 answer:
exis [7]4 years ago
4 0

The available options are:

Emails

Financial spreadsheets

User downloads

Databases

Answer:

User downloads

Explanation:

The correct answer is User downloads, this is because, the downloaded files are in cloud or another website memory or database, which serves as an alternative backup already. Thus, those downloaded files can still be recovered at later time when one needs to get the files back.

However, Emails, Financial spreadsheets and Databases, do not have any other place to retrieve them, because they are originally created and are yet to be uploaded to cloud or another website memory space to serves as alternative back up.

You might be interested in
How can you check an orthographic drawing to be sure there are no missing lines
user100 [1]
With an magnify glass
4 0
3 years ago
Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives
mafiozo [28]

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

  • In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.
  • In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.
  • In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.
5 0
3 years ago
Does anyone know how to execute this assignment on Scratch?
lapo4ka [179]

Execute this assignment from Scratch in the following way

Explanation:

1.For each thread, first Scratch sets the 'active thread' to that thread. Then, it executes each block one by one in the stack for the active thread. It will execute the entire stack all in one go if it can.

2.The Hide block is a Looks block and a Stack block. If the block's sprite is shown, it will hide the sprite — if the sprite is already hidden, nothing happens. This block is one of the simplest and most commonly used Looks blocks.

3.Scratch is used in many different settings: schools, museums, libraries, community centers, and homes.

4.Mitch Resnik, the creator of the super-simple Scratch programming language and head of the Lifelong Kindergarten group at the MIT Media Lab, gave a TEDx talk about the value of coding and computer literacy in early education.

5.

5 0
3 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
Which of the following which of the following is an advantage of using functions ​
Paha777 [63]

Answer:

kkbvvvvvvvvvvvvvvvvv'vvvkk

4 0
3 years ago
Other questions:
  • You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
    6·1 answer
  • How many steps are there on Mail Merge Task Pane? List them.​
    9·1 answer
  • Difference between video game laser and projectile
    9·1 answer
  • The seventh generation of PMS, entails the migration of computing resources (e.g., hardware, software, and data) to a remote dat
    12·1 answer
  • What is the output of the second println statement in the main method, public class foo { int i ; static int s ; public sttic vo
    15·1 answer
  • Which features should a study schedule include? Check all that apply.
    15·2 answers
  • Ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of soft
    6·1 answer
  • ____ arguments may provide more control over the returned value.
    13·1 answer
  • What are the 3 symbols that can’t be used when saving a document? (From Microsoft Word 2016) (pls helped me!)
    6·1 answer
  • What is ms- power point?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!