1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
6

Explain why the local disc of a computer start from C and not A​

Computers and Technology
1 answer:
natima [27]3 years ago
7 0

Answer:

In older times, A and B drives were reserved for floppy disks or tapes. This is why C and subsequent letters are for used hard/other drives

Explanation:

You might be interested in
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
What is the best way to protect against the loss of important files
Lemur [1.5K]
Back them up on a different drive
4 0
3 years ago
1. ¿Cuál es el papel de la voz en la radio?
MrRa [10]

Answer:

Locutor

Explanation:

Asi se llama el papel de la voz en la radio

Espero y te sirva :)

5 0
3 years ago
What are two reasons for entering the ping 127.0.0.1 command on a windows pc?
Hunter-Best [27]

127.0.0.1 is the loopback Internet Protocol (IP), the address is used to establish an IP connection to the same computer being used by the end-user.

The some reason that a person will command a ping 127.0.0.1 in a command prompt is because they will check if the NIC and drivers implementation is functional and it used in testing the TCP/IP.

4 0
4 years ago
Read 2 more answers
In 2013, the national retailer Target Corporation suffered a major data breach that put the financial information of an estimate
katen-ka-za [31]

Answer:

Security Policies

Explanation:

As computer systems continue to become complex, it makes it hard for co-operates and big businesses to understand the technology that comes with it. Organizations are concerned with how risks are being handled, managed, and reduced. They therefore, expect security policies to reflect how information should be handled. Better security policies shows a company's commitment to protect data and keep the business healthy.

4 0
3 years ago
Other questions:
  • Is Windows a:<br><br> A.operating system<br> B.software<br> C.hardware<br> D.input device
    12·1 answer
  • What role do mobile devices play in shaping the world?
    5·2 answers
  • The process of providing and denying access to objects is called:
    5·1 answer
  • An increase in pay because of how well you do a job is called _____.
    9·2 answers
  • Is Wikipedia or a .gov website with more information about the subject not a good enough explanation not a good explanation for
    7·1 answer
  • What is the definition of a digital signal?
    14·1 answer
  • You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
    14·1 answer
  • Hello pls answer<br><br><br>what is the use of loop in java​
    5·1 answer
  • Describe accessibility in Windows 7 ​
    13·1 answer
  • "a web client that connects to a web server, which is in turn connected to a bi application server, is reflective of a"
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!