1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
14

I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b

ack and does not transfer. What is the likely cause of this issue?
a. hard drive is full

b. photos were taken in a different country

c. USB port is broken

d. the file structure of the 2 hard drives are not compatible
Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
7 0
Your answer is D.

Hope this helps and if you could answer the question I just uploaded titled giving brainliest that would be great. Basically, what you have to do is research why the book titled the list of things that will not change and explain why it’s your favorite book based on the message it tells you! Go to my profile and go to questions.
You might be interested in
The Smith family has five children who work in a variety of careers. They include a Building Designer, an Astrophysicist, a Comp
Viefleur [7K]

The correct answer is the Science, Technololy, Engineering and Math career cluster.

All of the five careers that are listed fall into the career cluster that is called Science, Technology, Engineering and Math. People working in this career cluster could work in science labs, design products and systems, or support scientists or mathematicians in their work.

7 0
3 years ago
Read 2 more answers
When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a messa
mr_godi [17]

Answer:

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

Explanation:

Playfair cipher  invented in 1854 by Charles Wheatstone was the first practical digraph substitution cipher. Lord Playfair promoted the use of the cipher, therefore it was named after him. Playfair cipher encrypts pairs of letters (digraphs) making it hard to break.  Frequency analysis can still be undertaken but requires much more cipher text in order to work. It requires no additional equipment to operate and is very fast therefore it is to protect information during war. It was used  by British forces in the Second Boer War and in World War I and during World War II by the Australians.  

When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in the morning of the 2 of August 1943  in Playfair code:

KXJEY  UREBE  ZWEHE  WRYTU  HEYFS  

KREHE  GOYFI  WTTTU  OLKSY  CAJPO  

BOTEI  ZONTX  BYBWT  GONEY  CUZWR  

GDSON  SXBOU  YWRHE  BAAHY  USEDQ

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

5 0
3 years ago
Jack has determined that a virus has infiltrated his computer and corrupted several of his data files. Which two utilities would
Romashka [77]
Antivirus programs to detect and eliminate viruses such as Malwarebytes, Stinger, etc.

A hard drive to backup all of his remaining files.

Corrupted files are not always possible to recover, but it's worth a try using a software such as Recuva.
7 0
3 years ago
Read 2 more answers
Guided transmission media employ an antenna for transmitting through air or vacuum.
olganol [36]

Answer: False

Explanation:

Unguided medium employs an antenna for transmitting through air or vacuum.

For guided mediums the transmission is in the form of twisted copper wires, shielded twisted copper wire and optical fibres. They henceforth do not depend upon antennas for transmission through air using antennas.

5 0
4 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
Other questions:
  • Assume that to_the_power_of is a function that expects two int parameters and returns the value of the first parameter raised to
    11·1 answer
  • On the CallCenterReport worksheet, add formulas that will summarize the issues for the department entered in cell B3. In cell B6
    13·1 answer
  • Which of the following is the most accurate description of what is known as the "digital divide". The digital divide is about ho
    5·2 answers
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • When do you need to use a fully qualified url in a hyperlink?
    6·1 answer
  • What is modularity? Help asap
    9·1 answer
  • What was your favorite animals, game, photo, friends,
    7·2 answers
  • In your own words, how are sources of income and expenses related to
    12·2 answers
  • High speed printer that produce higher quality printouts but are more expensive is
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!