1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
12

What is a computer class from 8​

Computers and Technology
1 answer:
Orlov [11]3 years ago
8 0

Explanation:

computer is an electronic machine which category write in computer data

You might be interested in
Describe and list advantages and disadvantages of each of the following backup types:
crimeas [40]

Answer:

Full back up

It creates complete copy of the source of data. This feature made it to the best  back  up with good speed of recovery of the data and  simplicity.However, because it  is needed for backing up  of  a lot of data, it is time consuming process,Besides it also  disturbs the routine application of  the technologist infrastructure. In addition large capacity storage is needed  for the  storage of  the large volume of back up with each new creation.

Incremental back up: back up work at high speed thus saves time, Little storage capacity is needed. This type of back up can be run as  many time as wished.

However, the restoration of data takes time, due to the time spent for restoration of initial back up and the incremental.

Differential Back up has very fast back up operation, because it only requires two pieces of back up.This is however slower compare to the Incremental.

The selective back up enable selection of certain type of file or folders for back up.

it can only be used to back up folders only when important data  are needed only.Thus the  storage capacity is low.

CPD eliminates back up window and reduces the recovery point objective.However, it has issue of compatibility with the resources to back up.,it is also expensive because its solutions are disk based.

Cloud based is affordable and save cost,It is easier to access. it is efficient,it can be access remotely for convenience.

However, Internet sources and some bandwidth must be available for access., always depends on third party providers,There is also problems encountered when switching providers.

Explanation:

8 0
3 years ago
CAN SOMEONE PLEASE PLEASE HELP ME OUT !!!!
34kurt

Answer:the answer is A

Explanation: develop a test to see what kind of circuits it takes to power a oven

4 0
3 years ago
Least common multiple of 78,90, and 140
Daniel [21]
The least common multiple (LCM) of 78, 90, and 140 is: 16,380

78 × 210 = 16,380
90 × 182 = 16,380
140 × 117 = 16,380
5 0
4 years ago
Read 2 more answers
Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
Nat2105 [25]

Answer:

True

Explanation:

Hope this helped!

3 0
3 years ago
Read 2 more answers
You are an online training company and stream a lot of training videos from your
Yuri [45]

I think It would be have to be tovuti

5 0
3 years ago
Other questions:
  • Unlike a virtual image, a real image
    7·1 answer
  • 2. Which of the following best describes the protocols used on the Internet?
    15·1 answer
  • What's the main piece of information you look for in an e-mail message you're investigating??
    14·2 answers
  • What is ur Favorite anime
    8·1 answer
  • Write only in C, not C++.
    14·1 answer
  • An algorithm requires numbers.<br> O True<br> O<br> False
    15·2 answers
  • Http://moomoo.io/?server=8:16:0
    6·2 answers
  • With SQL, how do you select all the columns from a table named "Persons"?
    8·1 answer
  • The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
    10·1 answer
  • Which two extensions in scratch are correctly matched to their accessibility goals
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!