1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
2 years ago
14

Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her compu

ters started to malfunction, and all her files were no longer accessible. What do you think happened to Ana’s computer and what can you do to avoid the same problem​
answer pleasssseeee
Computers and Technology
1 answer:
o-na [289]2 years ago
5 0

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

You might be interested in
Samantha received a gaming session as a gift. She would like to have it communicate with her sister Jennifer’s gaming system so
WARRIOR [948]

Answer:

Wi-Fi Direct

Explanation:

Wi-Fi Direct is a Wi-Fi standard for peer-to-peer wireless connections that allows two devices to establish a direct Wi-Fi connection without an intermediary wireless access point, router, or Internet connection.

3 0
3 years ago
A type of sensor used to detect which way around a device is being held. ​
Marta_Voda [28]
There’s 3 main ones accelerometer, gyroscope, and magnetometer.
8 0
2 years ago
Jnhj hjibfnufnbfjbnkfv fj v
kirill [66]

Answer: baller.

Explanation:

6 0
3 years ago
Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
Tems11 [23]

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

8 0
3 years ago
Write an application that reads an English-language phrase and encodes it into Morse code. Also write an application that reads
Morgarella [4.7K]

Answer: English to Morse code. Hello my name is Isabella:   .... . .-.. .-.. --- / -- -.-- / -. .- -- . / .. ... / .. ... .- -... . .-.. .-.. .-

Morse code to English: .. / .-.. .. -.- . / -- .- - ....  is I like math

6 0
3 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • An important advantage of using GUI data-entry objects is that you often can control what users enter by limiting their options?
    6·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) + licenseYear. Sample output:
    10·2 answers
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • Yolanda lost her left foot during her military service, but she has been issued a prosthetic that enables her to walk normally,
    13·1 answer
  • Please answer this correctly what’s the answer opening modify style dialog box enables you to
    8·1 answer
  • Which character formatting effect makes text appear in a small font size below the midpoint of a line of text
    6·1 answer
  • Full from of tmc computer
    8·2 answers
  • What instructions would a computer have the hardest time completing correctly
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!