1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
3 years ago
14

What types of files we do backup in UNIX and Linux?

Computers and Technology
2 answers:
katrin [286]3 years ago
8 0

Answer:

Nas ja kaki yawe diy. Kitu mu chuk k a jana a.

Explanation:

Karu explain pudi diya chal puter chuti kar.

marin [14]3 years ago
7 0

sir bilal wants to know your arid number for 2 extra grades.

You might be interested in
Administrative activities, such as archiving project files, closing out contracts, documenting lessons learned, and receiving fo
asambeis [7]

Answer:

closing

Explanation:

6 0
3 years ago
Which group of commands all appear on the Standard toolbar?
Komok [63]
<span>The toolbar on the top of screen and menu bar the mean part of commands.</span>
7 0
3 years ago
Read 2 more answers
What are the data types in access​
Julli [10]

Answer:

Data type in Microsoft Access Database

Text  

Memo  

Byte  

Integer

Long  

Single  

Double  

Currency  

AutoNumber  

Date/Time  

Yes/No  

Ole Object  

Hyperlink  

Lookup Wizard

Explanation:

4 0
4 years ago
The int function can convert floating-point values to integers, and it performs rounding up/down as needed.
omeli [17]

Answer:

Thks is true the int function changes a float value to an integer and will round up or down by default.

5 0
3 years ago
____ is a technology that exists inside another device
Julli [10]

Answer:

Embedded technology is a technology that exists inside another device.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find t
    7·1 answer
  • How to see the range of values of vty lines?
    15·1 answer
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • How would you classify an employee who is punctual, has respect for oneself and others, and takes initiative?
    13·2 answers
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • Katy and her associates are approached by an aged tai chi expert to create a website for him. From her participation in an onlin
    9·1 answer
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • Classify the functions of dhcp and dns protocols​
    14·1 answer
  • Which backup requires a small amount of space and is considered to have an involved restoration process?
    15·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!