1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
13

Please answer this question​

Computers and Technology
1 answer:
ASHA 777 [7]3 years ago
6 0

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

You might be interested in
Which of these tools can best be used as a self assessment for career planning purposes?
Furkat [3]

a self-directed is the correct answer
3 0
3 years ago
Read 2 more answers
Which of the following is 1000 of a second​
s344n2d4d5 [400]

Answer:

what I don't understand your question

6 0
4 years ago
Kelly is evaluating the following image. Which of the statements that she makes about the photograph is true?
Stells [14]

Photo not included

Plz add photo

7 0
3 years ago
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
Other questions:
  • You are opening a existing file fot output. how do you open the file without erasing it
    7·1 answer
  • In a pie chart showing showing the voting choices of 120 voters, the blue slice of pie is half of the pie. This means of 60 vote
    12·2 answers
  • How to add a second screen to your computer?
    7·1 answer
  • A microphone is a type of electronic.<br><br> True/Faulse
    14·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    13·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • Midday is a good time to take a portrait outside.<br> true or false?
    8·1 answer
  • Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app and the app. The has limite
    15·2 answers
  • Which of the following items can you locate in a document using the navigation pane? Choose the answer.
    10·1 answer
  • While working on a Windows workstation, you've enabled Remote Desktop.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!