1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
8

A technician reports that all the data on a computer has been lost during an operating system upgrade. She or he says she or he

backed up the data before beginning the operation. This suggests she or he backed up the data to the ________.
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
7 0
The Hard Drive or the SSD
You might be interested in
Consists of a variety of circuitry and components that are packaged together and connected directly to the motherboard. it perfo
Goshia [24]
This is true because the motherboard is the main holder of all the operation and connection of all the system.
3 0
3 years ago
What frequency band is used by bluetooth, 802.11b, and 802.11g?
bagirrra123 [75]
802.11 is a Wi-Fi standard, not a frequency, both of those operate at 2.4 GHz. Bluetooth operates at frequencies between 2402 and 2480 MHz, or 2400 and 2483.5 MHz. 
4 0
3 years ago
Implement the function charCnt. charCnt is passed in a name of a file and a single character (type char). This function should o
SVEN [57.7K]

Answer:

Answered below

Explanation:

//Program is written in Python programming language

def charCnt( fileName, char){

if not fileName.exists( ):

return sys.exit(1)

else:

openFile = open("$fileName.txt", "r")

readFile = openFile.read( )

fileLength = len (readFile)

count = 0

for character in range(fileLength):

if readFile[character] == char:

count++

openFile.close( )

return count

}

7 0
3 years ago
One problem with using e-mail is that ______. a. It can be perceived as being too casual b. It is never appropriate for business
Free_Kalibri [48]
I personally feel that e-mail can be used for more business settings and as a more formal approach to things as opposed to a text, but option C seems to be more of an opinion.  I would go with C or D.
6 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a check
    9·1 answer
  • Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm
    11·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • In the cis configuration, the methyl groups are placed _____.
    8·2 answers
  • What is the result of executing the following code? You can assume the code compiles and runs. #include using namespace std; voi
    6·1 answer
  • How to add more then one picture on a brainy question really need this
    8·1 answer
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • The Self-Quiz gives you an opportunity to self-assess your knowledge of what you have learned so far.
    13·1 answer
  • The most important part of a computer​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!