1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
5

What products data from corruption?​

Computers and Technology
2 answers:
vesna_86 [32]3 years ago
7 0

Answer:

Types of data corruption

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.

...

Data Integrity Field.

ECC memory.

Forward error correction.

List of data recovery software.

Parchive.

RAID.

Reed-Solomon error correction.

Explanation:

pav-90 [236]3 years ago
4 0

Answer:

The following are possible causes of data corruption:

Bad program exits

Malware/virus infections

Sudden loss of power--shutdown

Voltage spikes

Physical hardware issues

Any interruption in normal computer processes

Too Large of a database size

Connected to the network via wireless router

Explanation:

You might be interested in
Which is the primary use of a word processor? create, edit, format, and print text-based documents maintain a database of record
qaws [65]
<span>Which is the primary use of a word processor? 
</span>
create, edit, format, and print text-based documents

------------------------------------------------------------------------------------------------

Hope This Helps :)

P.S
If you could mark me as brainiest that would be great! :D
3 0
2 years ago
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
1. A green traffic sign means
NeX [460]

Answer:

general regulatory and speed control.

7 0
3 years ago
_______ integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT sys
aleksklad [387]

Answer:

ERP ( Enterprise Resource Planning )

Explanation:

ERP mainly stands for enterprise resource planning. ERP is system software which is a combination of many application which works together to automate a business process.  

It is a business management software which reduces the wastage of time by making tasks simpler like when we talk about accounting and stock in a company, it takes very much time when maintaining by humans but when it comes to ERP software, it only takes a while to give you detailed information about everything. It automates the manual process of a company and gives speed to the growth of the company.

3 0
2 years ago
What usually happens at a police check? Do they just look up your name in their system?
sdas [7]

it depends on the kind of police check. like if its a road block type of check, they make sure everything is right. if you get pulled over you get your name ran in the system to check if you have warrents or warning and depends on what you get pulled over for, you could get a ticket or detained.

5 0
3 years ago
Other questions:
  • Why would an over the shoulder shot be used
    11·1 answer
  • What is the differnces between dark and middle ages of computer?​
    9·1 answer
  • Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find t
    7·1 answer
  • What is the smallest unit of data on the hard drive?
    5·1 answer
  • Unemployment can be viewed as
    14·1 answer
  • What do you call the destination router on the network endpoint?
    7·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,050,
    14·1 answer
  • What type of formula uses data from multiple worksheets
    6·1 answer
  • 4.8 code practice question 1 edhesive
    8·2 answers
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!