1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
10

Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB

has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?
Computers and Technology
1 answer:
ahrayia [7]3 years ago
7 0

<u>The total size of backups:</u>

The source data is 50 GB. When its full backup is created, it takes 50 GB of space. Now, next week when 10 more GB of data has been added, the total source data are 60 GB. On creating another full backup, the size comes  out to be 60 GB as well and cumulative backup is 50 GB + 60 GB which equates to 110 GB.

In the second week, another 30 GB has been added to the source data, and on full backup creation, the size will be 60 GB + 30 GB which equates to 90 GB. So, the total size of backups saved till date will be 110 GB + 90 GB which equates to 200 GB.

You might be interested in
Yall rachits and yall eat butt xD
Trava [24]
Please use this for questions.
6 0
3 years ago
Read 2 more answers
Please choose the correct answer please tell fast​
pav-90 [236]

Answer:

the answer might be 2......

7 0
3 years ago
Which type of information could be displayed using this line graph?
ollegr [7]

Answer:

The first one I'm sorry if I'm wrong

3 0
3 years ago
Read 2 more answers
Which type of password provides the highest level of permissions in bios?
OLEGan [10]
<span>Which type of password provides the highest level of permissions in bios? = Supervisor provides the highest level of permissions in the BIOS</span>
6 0
3 years ago
Which of the following describes a Trojan horse?
HACTEHA [7]

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

7 0
3 years ago
Other questions:
  • Discuss 2D gameplay and how new platforms such as cell phones are taking advantages of this renewed market
    5·1 answer
  • PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the childr
    13·2 answers
  • ***Help ***Which Paste Command is used to insert a new linked Excel worksheet into a PowerPoint presentation? A. Embed B. Use De
    7·1 answer
  • Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The
    8·1 answer
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • How can a user access the Mailbox Cleanup tools?
    11·2 answers
  • What type of platform is Twitter?
    10·2 answers
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
  • Which of the following symbols is a part of all spreadsheet functions?
    7·2 answers
  • This unintelligent brain of mine decided to charge my phone overnight thinking that nothing bad will happen ;-; the next morning
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!