1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
10

Describe what Carmen should do in the following scenario.

Computers and Technology
2 answers:
Fudgin [204]3 years ago
8 0

Answer:

...................USB?

lukranit [14]3 years ago
6 0

Answer:

USB

Explanation:

There are different ways to create data back up. For example.

  • USB.
  • external hard drive.
  • Time machine.
  • Network Attached Storage.
  • Printing
  • Cloud Storage

every method has its own pros and cons but they can all be used for data backup. Most cost efficient is USB as compared to the rest.

You might be interested in
List the invoice number and invoice date for each invoice that was created for James Gonzalez but that does not contain an invoi
Ludmilka [50]

Answer:

Derive FROM invoice_transaction, invoice_details, item_details

and JOIN customer_details  ON (invoice_transaction.CUST_ID = customer_details.CUST_ID  AND customer_details.FIRST_NAME = 'James'   AND customer_details.LAST_NAME  = 'Gonzalez')

Explanation:

The following details will be there in the invoice

  1. item_details
  2. rep_details
  3. invoice_details
  4. customer_details
  5. invoice_transaction

 Derive FROM invoice_transaction, invoice_details, item_details

and JOIN customer_details  ON (invoice_transaction.CUST_ID = customer_details.CUST_ID  AND customer_details.FIRST_NAME = 'James'   AND customer_details.LAST_NAME  = 'Gonzalez')

6 0
3 years ago
To plan a pizza party, one may want to order enough pizza for everyone. Use the slicesInPizza, slicesPerPerson, and totalGuests
zheka24 [161]

Answer:

Explanation:

The following code was written in Javascript. It asks the user to enter the values for each of the variables and saves it to them. Then it uses those values to calculate the total number of pizzas needed to feed everyone at the party. Finally, it prints out the total to the screen as an alert. Both test cases were used and the outputs can be seen in the attached images below.

var slicesPerPizza = window.prompt("How many slices per pizza?");

var slicesPerPerson = window.prompt("How many slices per person?");

var totalPersons = window.prompt("How many total people will attend?");

var pizzasNeeded = Math.round((slicesPerPerson * totalPersons) / slicesPerPizza)

alert(`You need a total of ${pizzasNeeded} pizzas.`)

6 0
3 years ago
A client wishes to update their legacy system even though there have been no
gulaghasi [49]

Answer:

A client wishes to update their legacy system even though there have been no security breaches since its implementation five years ago. If the client has not suffered any attacks, why is it still necessary to update their system? ... Because new security threats emerge all the time.

8 0
3 years ago
What is open addressing?
victus00 [196]

Answer:

Open addressing is the technique used in the hash tables  during the collision resolution. This method is also known as closed hashing.This techniques helps in the solving the issue of collision.

All the keys gets placed in the hash table and so the size of hash table equal to or greater number of overall keys.There are three techniques used for open addressing, which are linear probing ,quadratic probing and  double hashing

3 0
3 years ago
List and explain five instances of issues that pertain to business ethics
castortr0y [4]
Social Media. ...
Harassment and Discrimination. ...
Health and Safety. ...
Technology/Privacy

Disability. ...
Equal Pay. ...
Pregnancy. ...
Race/ Color. ...
Religion. ...
4 0
3 years ago
Other questions:
  • 18. Which type of briefing is delivered to individual resources or crews who are assigned to operational tasks and/or work at or
    14·1 answer
  • Which different supports from a part of the matte box?
    8·1 answer
  • Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
    15·1 answer
  • A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
    9·1 answer
  • What are some programs that you have used that have condition-controlled loops and count-controlled loops?
    10·1 answer
  • HOW IS THE AUTOFILL FEATURE HELPFUL? A.IT CREATE A NEW FORMULA FOR EVERY CELL IN THE DOCUMENT B.IT CAN SAVE TIME BY ALLOWING YOU
    13·1 answer
  • What are the two main parts to a VR experience.
    12·1 answer
  • Explain the term creating in word processing​
    12·1 answer
  • Additional metadata data is stored alongside the binary colour values for each pixel. Give two examples of metadata?
    9·1 answer
  • Data files whose records are always retrieved in sequence from the beginning of the file are known as
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!