1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
14

Which would be the most efficient way to store files on your computer?

Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
3 0

Answer:

Best way to store all your files is a external storage device, like a hard drive or a usb stick, copy all your files to the device and keep it in a safe place.

You might be interested in
Explain the steps you take when conducting research online to ensure it the source is providing reliable information.
Gala2k [10]

Answer:

Author

Date and

Source

Explanation:

Author – Information on the internet with a listed author is one indication of a credible site. ...

Date – The date of any research information is important, including information found on the Internet. ...

Sources – Credible websites, like books and scholarly articles, should cite the source of the information presented.

5 0
3 years ago
What's the difference between an exe file and an msi file? check all that apply.
motikmotik

An EXE file is an executable that may have an MSI file as one its help; An executable or EXE file can "wrap" an MSI file, which is used by the Windows Installer to guide the building process of an application.

MSI files are utilized by the Windows Installer to control how your application is installed.

<h3>What is the difference between an EXE file and MSI file?</h3>

The main difference between the two attachments is their purpose. EXE is used mainly to indicate that the file is an executable one.

In comparison, MSI indicates that the file is a Windows installer. While an MSI is operated only with installers, this is not the case with EXE.

To learn more about EXE file, refer

brainly.com/question/28146265

#SPJ4

7 0
2 years ago
Which of the following is the safest authentication method?
myrzilka [38]

The safest authentication method is authentication using a smart card.

Smart Card Authentication uses a physical card along with a smart card reader and software on the workstation to validate users into enterprise resources like workstations and applications. Although smart card authentication offers a terrible user experience and is expensive to deploy and maintain, it is very secure.

Because smart card authentication requires a physical credential, a hardware card reader, and software, it is expensive and difficult to administer. Smart cards are only used in the most secure workplaces, such as three-letter agencies of the federal government or privileged access at a financial institution, as these environments frequently forbid employees from carrying smartphones to and from work.

To learn more about Authentication click here:

brainly.com/question/17217803

#SPJ4

6 0
2 years ago
What is the function of the GUI?
topjm [15]
C. Provides an interface between user and OS.
The GUI, or Graphical User Interface, is just about everything you generally see with a common computer or smartphone.  You rarely run an application or program from the command itself, as clicking an icon in the GUI runs the software for you.
6 0
4 years ago
Read 2 more answers
Which sentence is an example of constructive statement
creativ13 [48]

Answer:

Which sentence is an example of a constructive I statement? “I think you are lazy; you never complete any work on time.” “I think you handled the problem in a very clever way.” “I feel stupid because I don't speak English well and can't converse with anyone here.”

Explanation:

5 0
4 years ago
Other questions:
  • Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
    6·1 answer
  • Place the following discoverers in the correct chronological order of the timeframe for their discoveries, from earliest to most
    5·1 answer
  • When you type into a basic search engine like Google, Bing, or Yahoo!, the sites that appear at the top or on the side of the re
    7·1 answer
  • When an application contains an array and you want to use every element of the array in some task, it is common to perform loops
    14·1 answer
  • Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp
    15·2 answers
  • Question No. 5:
    7·1 answer
  • What is the device that is non-volatile sometime called external memory?<br>​
    15·1 answer
  • What is the purpose of the domain name system
    15·2 answers
  • Question 1 (1 point)
    5·2 answers
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!