1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
4 years ago
9

The salespeople at hyperactive media sales all use laptop computers so they can have easy access to important data on the road.

however, there is a concern that the salespeople keep data on those laptop computers and the data is never backed up. if the hard drive in the laptop fails, important information would be lost. explain how onedrive can help in this scenario.
Computers and Technology
1 answer:
laiz [17]4 years ago
6 0

Answer:

By backing up the important information from the laptop computers to OneDrive, if a hard drive failure is to occur, assuming the salespeople have internet, they may access OneDrive and download any and all applicable data, resolving the issue.

You might be interested in
Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
nexus9112 [7]

Answer:

D. Fault tolerance

Explanation:

  • Fault Tolerance basically refers to the feature or capability of a  system to keeps on working and performing its operations without interruption in case of a failure.
  • This failure can be the failure of one or more of its components.
  • This is beneficial as the system does not stop working or fail completely.
  • It provides copies of the same system or backup components which can be used when the existing system fails and prevents the loss of information and services.
  • Accessibility  refers to provide equal services for everyone who uses a system. So its not a correct option.
  • Moore’s law states that the computing speed and power will double every two years so its not a correct option as well.
  • Anti virus is a software to identify, prevent and remove viruses and malware so it is not a correct option as well.

3 0
3 years ago
If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:
In-s [12.5K]

Answer:

Have a more specified search

Explanation:

If you do this in G0OGLE Then it will be the same thing all it basically does it narrow down the search to find more of what you want

4 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
Graphic design has evolved rapidly in recent years with the advancement of digital technology. Discuss how the evolution of grap
Yuki888 [10]
We interact with products of graphic design every day. Graphic design is used to make the billboards we drive by on our way to school, the pleasing layout of our favorite website, the covers of our most loved book, even the traffic signs we pass. The evolution of graphic design has only improved our visual world. Designers are constantly seeking to find the best and most effective ways of presentation, which means that the traffic signs you see are in a bold, large font so that you don't have to squint to read them. This is a result of designer's constant process of seeking out the most effective tools of visual communication that will make our lives easier, whether we're aware of it or not.
4 0
3 years ago
What sorts of routine, seemingly unimportant information would help you learn about or break into another company’s network?
tatuchka [14]

Answer and Explanation:

  • Reboot your Computer from which you need to break into.
  • With your remote Ethernet card embedded and the unprotected passageway will mate up in a flash. You likewise need to change the Service Set Identifier (SSID) on your Ethernet card to coordinate SSID on the system's passage. You can decide to physically constrain your DHCP settings to reestablish, however on the off chance that that gives you any trouble.we need to re-boot it.
  • The Third Man ran a sniffer program that caught the majority of the LAN traffic within this organization. It was transmitted through the remote passageway straight into the Third Man's PC. Passwords. Agreements. Email.
4 0
4 years ago
Other questions:
  • Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
    13·1 answer
  • According to Mintzberg's classification of managerial roles, the role of a(n) ______ is to transmit information received from ou
    7·1 answer
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • What inventor patented the first American movie projector?
    14·2 answers
  • Name the six parts of the product development life cycle.
    7·2 answers
  • In working on the conceptual design of the new database, Ken determines that the "office" field in one of the tables must includ
    8·1 answer
  • Which feature of vitualization helps increase the IT productivity of a business?
    10·1 answer
  • What is the awnser ?
    11·1 answer
  • Could I use a prepaid card to buy a Brainly membership because I tried to get the trial with a low balance but more than like 5$
    11·1 answer
  • How is peace circulated?​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!