1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
10

NEED HELP ASAP!!!!!!!!!!

Computers and Technology
2 answers:
dezoksy [38]3 years ago
8 0

Answer:

see just copying only records and stores other kids cuz the word e where dis Imaging only fitrist disc

HACTEHA [7]3 years ago
3 0

Answer:

A

Disk copying moves the entire contents of one disk to another whereas disk imaging creates a compressed file for backup

Explanation:

You might be interested in
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
The ____ contains buttons that provide different views of the document window, and some common operations related to viewing and
alexandr402 [8]
I think it is called a document tool bar
8 0
3 years ago
Explain why much of social media marketing is trial and error.
Ivahew [28]
The first thing that entrepreneurs need to realize is that the process and framework for making social media marketing work are different from traditional marketing, and trial and error certainly doesn’t work. Ric Dragon, an expert in online marketing, in his new book “Social Marketology<span>,” outlined the best set of steps I have seen so far for the new world:</span>
7 0
3 years ago
With reasons explain why a computer system is said to be more intelligent than the human brain​
belka [17]

Answer:

The rising power of computers and advances in Artificial Intelligence has reenergized the debate of intelligence of computers relative to humans. Human brain has about 100 billion neurons which are often compared to gates in computers.

Explanation:

6 0
3 years ago
She wants to sort the list based on the names of the first four gas in ascending order. Which command group dose she navigate to
zubka84 [21]

<u>Best method to sort data:</u>

Best method to sort for data people use excel sheet.  If we have 4 quarter sales data of each select man wise.

1. Open the MS Excel

2. Create blank sheet

3. Create list of salesman and quarter sales in each cells from A1….

4. Select all whole worksheet and paste it the data

5. Once data is copied, custom list is created and select advanced options dialog box, select required field and sorting is achieved.

This is simple’s method for sort the list based on the names of the first four gas in ascending order.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which function is used to display a string value to the screen?
    8·1 answer
  • Which type of view is created from the following SQL statement? CREATE VIEW balancedue AS SELECT customer#, order#, SUM(quantity
    15·1 answer
  • One item you will NOT need to provide when opening up a bank account
    9·2 answers
  • The following is the pseudocode for which type of algorithm? For maxElement = each subscript in the array, from the last to the
    14·1 answer
  • What would be the most efficient way for the chain's
    15·1 answer
  • What is an effective way to record change management? (5 points)
    9·1 answer
  • PLz answer I really need the answer
    5·2 answers
  • 2.5 code practice
    12·1 answer
  • Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not t
    11·1 answer
  • When is founded by java
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!