1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
4 years ago
5

What products data from corruption?​

Computers and Technology
2 answers:
vesna_86 [32]4 years ago
7 0

Answer:

Types of data corruption

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.

...

Data Integrity Field.

ECC memory.

Forward error correction.

List of data recovery software.

Parchive.

RAID.

Reed-Solomon error correction.

Explanation:

pav-90 [236]4 years ago
4 0

Answer:

The following are possible causes of data corruption:

Bad program exits

Malware/virus infections

Sudden loss of power--shutdown

Voltage spikes

Physical hardware issues

Any interruption in normal computer processes

Too Large of a database size

Connected to the network via wireless router

Explanation:

You might be interested in
TRUE/FALSE<br><br> The Interrupt Flag (IF) controls the way the CPU responds to all interrupts.
Nastasia [14]

Answer: True.

Explanation:

The value of the IF is very important to respond to the interrupts in the OS. It is a system flag bit. All the hardware interrupts will be handled if the flag value is set to 1 else all interrupts will be ignored. It takes two values either 1 or 0.

3 0
4 years ago
Why is being distracted by the sights and sounds of our devices dangerous?​
11111nata11111 [884]

Answer:

because we lose our reflexes and our lucidness... if we r in our devices we dont see the world. we dont see the dangers we dont see or feel what we need to to survive. we find safety in things like electronics but they will never help us when it comes to real life problems. like if we are going to get hit by a car we are reading our phone not looking at our surroundings not listening to the warnings.

Explanation:

hope this helps

8 0
3 years ago
Two types of binocular depth cues are __________ and __________.
OverLord2011 [107]
Binocular depth cues are the 'things' that help us to judge distance. The two main ones that relate to binocular vision are:

1. Convergence.
This is the fact that as we get closer to an object, our eyes begin to point inward to remain focused on the object. I.e. we go cross eyed. 

2. Disparity
This is the fact that our eyes both see a different image when focused on an object because they are actually looking at it from a different perspective (about 6 centimeters apart). This disparity changes based on the object distance from the observer so is also a cue used by our brain to judge distance.
4 0
3 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
Should you ever force a CPU into<br>its socket?​
tatyana61 [14]

Answer:

no you should not force a cpu into its socket.

Explanation: on an intel platform the pins are on the motherboard, therefore if you force it in it will damage the pins on the motherboard, and on AMD the pins are on the cpu itself so you can damage the extremely fragile pins on it, you can not shock your cpu however like the other answer.

7 0
3 years ago
Other questions:
  • ASAP PLZ!!!!!! Type the correct answer in the box. Spell all words correctly What are the steps of moving data into a data wareh
    9·1 answer
  • What's a good show to watch on Netflix?
    7·1 answer
  • A _____________ is some text or data that is stored on your computer and used by a website to track how you use that site. quest
    8·2 answers
  • When working with a table, combining two or more cells into one is known as _____.
    12·1 answer
  • What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?
    7·1 answer
  • Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
    13·2 answers
  • Why am I not getting the activation link for my account?
    11·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
  • When using the protection options in Excel 2016, what does the Protect Workbook function do?
    8·2 answers
  • All the network nodes are connected to each other
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!