1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
15

Jack lost all the data he saved on his desktop because of a power outage while working on a presentation. On which of these comp

uter components must Jack have saved his data?
Computers and Technology
2 answers:
Kay [80]3 years ago
6 0

Answer:

Flash memory.

Explanation:

If you lost all the data you were working on while it was being saved to your computer's desktop because of a power outage, don't worry. When you turn on the computer again, it is likely that this data is stored in flash memory. This is because this memory is characterized as a non-volatile memory, which means that it does not necessarily need energy so that it can store information temporarily, until you have access to your computer again and transmit the saved information to another place. .

Afina-wow [57]3 years ago
5 0

Data is saved in the hard drive of a computer unless otherwise specified. Other locations data can be stored include CD's, "Clouds," or flash drives.

You might be interested in
A tower or mini tower pc is a type of all- in -one unit true or false
Svetlanka [38]

Answer:

thx

Explanation:

5 0
3 years ago
Read 2 more answers
Find the gear ratio of the gear in the picture. <br><br> 25 points+brainliest
ankoles [38]

The gear ratios would look like A:B=1:9 and C:D=1:32 if you are just needing the gear teeth ratio. Not a lot of information to go off of from the question though

8 0
3 years ago
Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must
11111nata11111 [884]

Answer:

C) chain

Explanation:

Small group network comprises of a vertical, direct, chain, all channel and box network

The vertical network is a network that is made for some specific purpose or goal of the business organization.

The direct network is a network that is directly interrelated to each other.

The chain network is that network in which the formal chain of command follows through which proper  communication can be done in all the departments without any barriers to a communication network

It also shows that each member can communicate the person below and above their position only in a vertical hierarchy. It follows the top-down approach

This all channel network follows an informal communication network through which anyone can communicate with anyone at any time with following any chain of the business organization

The box network covers all the things in one network. Like -  various software, packages, etc

In the given case Peter is asking permission from the supervisor and supervisor is discussing with the department director, is showing the formal chain of command that's why according to the given scenario the most appropriate answer is chain network.

8 0
3 years ago
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
Plz answer me will mark as brainliest ​
victus00 [196]

Answer:

Application

Explanation:

Application software comes in many forms like apps, and even on computers. The software is most common on computers of all kinds while mobile applications are most common on cellular devices.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is AI and its necessary types?
    6·1 answer
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False
    10·1 answer
  • Conduct online research and provide some guidelines on how to secure a web browser. (CyberSecurity plato)
    10·1 answer
  • Counter-controlled repetition is also known as:
    8·1 answer
  • Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynami
    6·1 answer
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • I made Pico with a Ray Gun (Next is Dad/Tankman)<br><br> Opinons?
    11·2 answers
  • What is the standard unit used to measure mass?​
    9·1 answer
  • What are two reasons to tie cables up and out of the way inside a computer case?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!