1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
10

Frank accidently overwrote his old document with a new document of the same name. He'd like to get his old document back. What f

eature of Windows will most easily enable him to retrieve a previous version
Computers and Technology
1 answer:
Archy [21]3 years ago
4 0

Answer:

the recycle bin?

Explanation:

usually when you overwrite something or delete it, it doesn't get entirely deleted rather stored in the recycle bin on your desktop i believe, and so you could retrieve applications through there

You might be interested in
Explain block diagram of. computer architure​
ozzi

Answer:

A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.

Explanation:

In your question you asked architure but maybe it is architecture (•;

5 0
2 years ago
Tech A states that batteries have different sizing and configuration requirements. Tech B states that this helps them to fit the
Ymorist [56]

Answer:

Both

Explanation:

Batteries come in different sizes and configurations. This is evident in car batteries where third sizes vary from car to car depending on the space and manufacturer's discretion.

Thus, Both technicians are correct.

Cheers

3 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
In your own words, describe what an acceptable use
astraxan [27]

The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

The items are:

  • Social media page .
  • Internet address, applications.
  • Accessing private or confidential information.

<h3>What is an acceptable use policy?</h3>

An acceptable use policy (AUP) is known to be document that is said to tell about the  constraints as well as the practices that a user need to agree to be able to  access a  given corporate network or the Internet.

Therefore, The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

Learn more about acceptable use policy from

brainly.com/question/2625500

#SPJ1

6 0
1 year ago
If you need to set up direct deposit, which information from your check would you likely need?
natita [175]
<span>When a person goes to set up a direct deposit slip from their checking checking they will need several things. They person will need the routing number to the financial institution and the checking account number from the financial institution. Both of these can be found on the bottom of a check. The person will also need to know the full name of the bank they are using. If the person has a debit card only, they will need to contact the bank to get their specific information to set up the direct deposit.</span><span />
5 0
3 years ago
Other questions:
  • The faster the film (the higher the ISO), the more visible its grain. When you are using higher ISO, you are not just bringing g
    5·2 answers
  • Write a program that will predict the size of a population of organisms. The program // should ask the user for the starting num
    6·1 answer
  • Given a Fahrenheit value temperatureFahrenheit, write a statement that assigns temperatureCelsius with the equivalent Celsius va
    9·1 answer
  • Why is yo utu be down?<br> (You restrict talking about yo utu be, really)
    11·2 answers
  • Which of the following tools helps ensure your document will open in older versions of word
    13·1 answer
  • You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want t
    10·1 answer
  • Frank enters "1" in the field for postal code. What is frank most likely trying to do?
    13·2 answers
  • How would you open the web browser in Linux and still have access to the Linux terminal?
    14·1 answer
  • Area Triangolo Rettangolo in c++
    6·1 answer
  • Topic: Video Games.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!