1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
4 years ago
9

Write six causes of data lost

Computers and Technology
1 answer:
just olya [345]4 years ago
3 0
<span>1. Deleting files accidentally
</span>

2. Viruses and damaging malware

3. Mechanical damages of hard drive

4. Power failures

5. Theft of computer

6. Spilling coffee, and other water damages

7. Fire accidents and explosions

<span>Hope this helps.</span>
You might be interested in
You want to establish the validity of a test designed for computer technicians using a predictive criterion-related validation s
fgiga [73]

Answer:

(C) people applying for computer technician jobs in your company.

Explanation:

According to my research on information technology, I can say that based on the information provided within the question in order to establish the validity of the test you should give the test to people applying for computer technician jobs in your company. Then examine and compare their score with their job performance if hired.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
How does an individual's access to a wide range of online services affects their ability to operate safely in the digital world.
S_A_V [24]
Nothing online is safe anymore!!!! People and even the government can get hacked easily with today's technology.You can search someone easily on websites like Google or Facebook and even read someone's tweets on Twitter because their account is not private. But what's the point of saying private if they can easily get hacked by someone. There is no safety these days that is why you have to be careful with what you post on the internet in general.
6 0
3 years ago
A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
Yuri [45]

Answer:

The overview of the given scenario is described in the explanation section below.

Explanation:

  • BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.
  • Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.

So the provided has never been the binary search trees of its algorithm.

A. 249

B. 342

5 0
3 years ago
Write a function in Erlang called func that takes a list of tuples and returns a new list consisting of tuples from the original
vovikov84 [41]

Answer:

Please find the complete question in the attached file.

Explanation:

Following are the code to the given question:

-module(helloworld)//use a module

-export([start/0])

start() ->//start module

func([Head Taill) ->//defining a method func that takes a parameter

{

first, second} = Head,//holding head value

if //defining if block

first > second -> func(Tail)//method func that takes a parameter

true ->

[first, second}|func(Tail)]//method func that takes a parameter

end

6 0
3 years ago
Other questions:
  • If you wanted to insert pictures into a presentation which tab would you use
    6·2 answers
  • When a process becomes digital, it often becomes cheaper and the workflow becomes simpler. True False
    5·2 answers
  • A computer that no longer works after having minor repair work done to it may have been damaged by ____
    13·2 answers
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    10·1 answer
  • What is computer software
    8·2 answers
  • The main workspace of a Windows computer is called the______
    5·1 answer
  • Marco had a database that showed the first, second, and third favorite ice cream flavors for each person in his school. He used
    11·2 answers
  • A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
    11·1 answer
  • Name at least 3 different portable computer devices that can be purchased
    15·2 answers
  • Jacob was sitting in class. His teacher understands that he is the type of student that doesn't comprehend when he sees or hears
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!