1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
2 years ago
11

Choices.

Computers and Technology
1 answer:
Svet_ta [14]2 years ago
7 0

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

You might be interested in
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
What errors does the grammar tool find? Choose all that apply
Anestetic [448]

Answer:

2

Explanation:

Because comma splices are not a thing.

(at least i don't think they are)

7 0
3 years ago
Give example of a biometric authentication device​
seropon [69]

Finger Print Scanner, Spit Sample, Face ID

7 0
3 years ago
Which of the following statements is FALSE?
ICE Princess25 [194]

Complicated faces and shapes are more easily remembered in games.

Thus, the correct option is C.

<h3>What is a game?</h3>

A game is a systematic kind of play that is typically done for enjoyment or fun, though it can also be used as a teaching tool.

A lot of games are also regarded as works of art. Sometimes people play games only for fun, while other times they play for recognition or reward.

Every game has participants, goals, a set of rules, and feedback. A game is what these things put together to make it.

A game's objectives, rules, difficulty level, and interactivity are crucial elements.

There are several reasons why people engage in mind games, but the main one is typically to exert control or authority over another individual.

Learn more about the games, here:

brainly.com/question/3863314

#SPJ1

3 0
1 year ago
Explain in detail what it means to synchronize computers and mobile devices and include at least two strategies for keeping your
olya-2409 [2.1K]

Answer:

Explanation:

To synchronize computers and mobile devices means to use a cloud service that constantly checks to see if local files are up-to-date with the files in the cloud. These services update the cloud files with the local files if they are overwritten for maximum convenience.

Two strategies for keeping files in sync are using Dropbox. Another way is using iCloud if one has Mac/iOS devices.

7 0
2 years ago
Other questions:
  • Uses of keyboard as a input device
    13·2 answers
  • Default tab stops are set in word every _______ inch.<br> a. ¼<br> b. ¾<br> c. ½<br> d. 1
    15·1 answer
  • you crossed two heterozygous red flowers (dominant color), what are your chances to have a white flower
    11·1 answer
  • How can i clear the CMOS​
    6·1 answer
  • Tuesday
    10·1 answer
  • Which of the following is not a responsibility of an operating system?
    9·2 answers
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • Choose the best answer from the drop-down menu. A ______ allows multiple connections to a single signal. Without a ______, conne
    7·2 answers
  • Question 12
    13·1 answer
  • Entrepreneur Employing Mobile Enterprise Apps AACSB Standards: Systems and Processes Australian-based entrepreneur Nathan Tuckwe
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!