1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
5

GUYSSS!!!

Computers and Technology
2 answers:
otez555 [7]3 years ago
8 0
Yea, I don’t think you can fix it unless you backed it up or something somehow...
maxonik [38]3 years ago
3 0
Is it ok of not now bro
You might be interested in
Write a paragraph on the importance of backing up data and mention at least three ways to back up data from your computer.
Scrat [10]

Answer:

Data backup is probably the most important part of any IT system. Backing up your data means periodically saving a copy of your computer’s information to an offsite location for safe keeping. Having a copy of your computer’s data protects it from being lost in the event of a hard drive failure

Explanation:

1-     On a Hard Drive (Onsite Backup)

2-     Online Backup Services (Offsite Backup)

3-     Cloud Backup Services (Offsite Backup)

5 0
4 years ago
What is an example of static we page?
OlgaM077 [116]
I’m pretty sure it’s B I hope this help you and I’m sorry if I got it wrong
4 0
4 years ago
Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen
nikdorinn [45]

Answer:

Answer is

By topic, By collection.

Refer below.

Explanation:

Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen. Do a search on wind power. Some criteria that can refine your search results in Quick Search are:

By topic

By collection

5 0
3 years ago
BitLocker Encryption can be deployed three ways. Identify which of the descriptions best describes the Computer Authentication m
ch4aika [34]

To  know  the descriptions best term about the Computer Authentication method is that On the motherboard of many laptops is a chip known as the TPM (Trusted Platform Module) chip. The BitLocker encryption key can be found on the TPM chip (also called the startup key).

<h3>How can a computer be verified?</h3>

The user or machine must demonstrate their identity to the server or client during authentication. A user name and password are typically required for server authentication. Card-based authentication, retinal scanning, voice recognition, and fingerprint authentication are further options.

Therefore, Data theft or exposure from lost, stolen, or improperly retired computers is a hazard that is addressed by the OS system-integrated data protection feature BitLocker Drive Encryption.

Learn more about Computer Authentication method from

brainly.com/question/3522088
#SPJ1

3 0
1 year ago
Designing the right elements for the tasks that the user is attempting to perform is called ________.
skelet666 [1.2K]

Answer:

Interface design

Explanation:

INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.

6 0
3 years ago
Other questions:
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • Transforming a message into an understandable sign and symbol system is _________.
    15·1 answer
  • Describe two ways the ARPANET is different from the internet
    12·1 answer
  • Which statement correctly explains why televisions became less bulky?
    6·1 answer
  • The hot wires in a service entrance panel are most likely to be covered with ________ insulation. A. red B. green C. gray D. whi
    14·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • What steps are needed for word to create an index
    6·2 answers
  • Knowing and understanding the targeted audience is a main compnent to creating a website
    15·1 answer
  • ((Sorry for the self promo btw) Can you guys help me try and get affiliate on twitch? I am currently at 20 followers and it woul
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!