1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
3 years ago
15

Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har

d drive failure? Check all of the boxes that apply.

Computers and Technology
2 answers:
grigory [225]3 years ago
6 0

Answer:A,B, and D

Explanation:

Anettt [7]3 years ago
4 0

Answer:

A B D

Explanation:

I just took it

You might be interested in
Please select the word from the list that best fits the definition Asking for review material for a test
Bess [88]

Answer:

B

Explanation:

7 0
3 years ago
Read 2 more answers
Which input device can advanced computer users use instead of a mouse to perform tasks such as opening new windows and saving or
pogonyaev
[C], a keyboard. A keyboard can pretty much do any basic tasks that a mouse can do, given that you know the short cuts.

For example,

CTRL + Esc to open the start menu, then use the arrow keys to navigate, and return key to select.

Windows Key + R to run a program, often in the form of an executable.

And obvious much, much more.
6 0
4 years ago
1. Which of the following is a search engine?
Effectus [21]
<span>C)Google
D) Search engines often provide different results, even when you enter the same query.
</span>
6 0
3 years ago
Read 2 more answers
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
∀פפIN∀W∀ qwda dawdawdawdawd<br> BAN ME NOW
Dvinal [7]

Answer:

why

Explanation:

6 0
3 years ago
Other questions:
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. suppose all of the interfaces in each of t
    11·2 answers
  • Example of hard ware that computers on a network can share are he operating and the web browser? True or false
    7·2 answers
  • These operating systems were referred to as command-based. A.Android and MS-DOS B.iOS and Windows C.LINUX and UNIX D.MS-DOS and
    12·2 answers
  • To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
    13·1 answer
  • Methods are used to define an object's behavior. True False
    8·1 answer
  • Which of the following is not a valid C language<br>int​
    6·1 answer
  • When a recipient responds to a meeting request, which statement most accurate descries what occurs?
    5·2 answers
  • How to create a trace table
    10·1 answer
  • What are different between system and application software?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!