1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
7

Answer is LOLOLyour so dumb jk its a i got it right

Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0
Ah well yes I know I’m dumb
You might be interested in
Suppose that a computer virus infects your computer and corrupts the files you were going to submit for your current homework as
Licemer1 [7]

Answer:

The answer is "Create all your important file backup regularly".

Explanation:

Data recovery is just the outcome of your files and folders becoming preserved or saved until they can be recovered in the event of data loss. It can occur from many issues from malware through file manipulation, authentication, or theft.

  • Data recovery is the retrieval process of missing, inadvertently deleted, damaged or unavailable data.  
  • It is mainly used in the o in business IT requires information recovery on some kind of desktop or laptop, network or remote backup.
8 0
3 years ago
wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
Helen [10]

Answer: The 5 different layers in the IP stack are as follows:

1. Physical Layer

2. Data Link Layer

3. Network Layer

4. Transport Layer

5. Application Layer

Explanation:

The functions of the different layers are:

The physical layer is concerned with transfer of bits  across the different nodes, The data link layer is concerned with transmission of frames with error detection and correction. The network layer is concerned with routing the packets across various nodes in the router. The transport layer deal with the implementation of protocols such as TCP and UDP. The Application layer host a numerous software applications such as  HTTP, SMTP for client server connections.

6 0
3 years ago
There's a rising issue with bots sending links starting with 'bit'. These links are dangerous and harmful for any computer or de
-Dominant- [34]
Hi there I just posted a question and this pop up

5 0
3 years ago
Read 2 more answers
NoSQL is a programming language used to create mobile apps.<br> a) True<br> b) False
finlep [7]

Answer:

False

Explanation:

7 0
3 years ago
Read 2 more answers
An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a
babunello [35]

a.) input attack is the correct answer

4 0
4 years ago
Other questions:
  • How is a network printer identified on the network?
    8·1 answer
  • What is the meaning for science?
    14·1 answer
  • Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
    15·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • The stack pop operation
    10·1 answer
  • Were does igneous rocks cool?
    9·1 answer
  • Supplies/material used in iron​
    11·1 answer
  • In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the qualit
    9·1 answer
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • Pls help quick... will mark brainliest...
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!