1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
6

In what way do networks help to protect data

Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
5 0

One way that computer networks help to protect data is by backing up the data.

Computer networks are normally formatted to automatically back up all of the data that is stored on them. This protects the data in case of any type of computer system failure.

You might be interested in
Which of these is an example of gathering secondary data?
Soloha48 [4]

Answer:

searching for a chart

Explanation:

:)

7 0
3 years ago
The 8086 was divided into two main parts. The _____ was the "brain" of the processor, and had the ALU, general-purpose register,
jonny [76]

Answer:

1.Execution Unit.  2.Bus interface unit

Explanation:

3 0
3 years ago
How does a barcode work?
Genrish500 [490]
A barcode's bars have 

1. different thicknesses, so they each signify 1 or 2 nibbles. 
2. the combinations of the thicknesses of those bars exceed the trillions. That's why manufacturers and stores never run out of SKU barcodes.
4 0
3 years ago
Which of the following steps should you take after attending a college fair?
leonid [27]

D. Make a decision about which colleges to attend that night.

5 0
3 years ago
Read 2 more answers
One shortcoming of rapid application development (RAD) is _____.
VladimirAG [237]
One shortcoming of rapid application development (RAD) is a narrow focus, which might limit future development.
8 0
3 years ago
Other questions:
  • You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
    11·1 answer
  • What part of a check is the LEAST important?
    14·2 answers
  • Write smallest to largest: Byte, bit, MB, PB, GB, nibble
    12·2 answers
  • Victor works for a telemarketing company that is on a very tight budget. He has been tasked with finding a method for the compan
    7·2 answers
  • Please answer my question y'all!
    6·2 answers
  • Three reasons Why we connect speakers to computers
    15·2 answers
  • In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click o
    8·1 answer
  • How to block admin on school chromebook managed by admin
    9·2 answers
  • I Previous
    6·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!