1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
7

Backup software creates backups and prevents you from losing all your data, so would backup software be considered an applicatio

n software or utility software?
A). application software

B). utility software
Computers and Technology
1 answer:
GuDViN [60]3 years ago
4 0

Answer: B

Explanation:

WHATS GOOD DAVE STRIDER? WHATS UP MAN I -  i man put the bunny back in the box what pumpkin apple juice?

ok so application software performs specific tasks for an end user and utility software just runs routine maintenance on your computer to ensure it runs smoothly. in this sense, the answer is B because if your computer crashed then you have no backup. things do not run smoothly obviously.

think of utility software as things such as antivirus, compression tools, defragmenter, and the other boring stuff that is meant for your computer to run smoothly

You might be interested in
Which option is correct??
Andru [333]

Answer:

a

Explanation:

intercultural communication is about enganging oneself within a social enviroment of foreign culture and different races among it.

3 0
4 years ago
What important technology has done the most to allow small businesses a change to compete with larger international companies.
Natalka [10]

Answer:

If this is actually college then thats weird cuz im in middle school and im doing this stuff. And the answer is wireless networks

Explanation:

3 0
3 years ago
What is the significance of both RAID and IP technologies as precursors to the SAN environment?
Dominik [7]

Explanation:SAN(Storage area network) technology is the network technology that is used for the accessing of the block level network towards the storage units. It is made up of the storage components, switches etc.

RAID(Redundant Array of Independent Disks) and IP(internet protocol) is used as the precursor because they work better than the SAN. They have the ability to solve the issue that occur in the SAN technology like complexity,and other faulty issues.They maintain the fault tolerance quality and maintaining the network.

3 0
4 years ago
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
1. Which of the following accurately describes a piece of work that contains a Creative Commons: No Derivative Works license?
frez [133]
1. B
2. C
3. C
Just did the test, these are the right answers!
3 0
3 years ago
Read 2 more answers
Other questions:
  • A customer in a store is purchasing five items. Design a program that asks for the price of each item, and then displays the sub
    11·1 answer
  • Choose the appropriate of an image that supports the text. You should also make sure that the image is
    12·2 answers
  • Which of the following game markets especially benefits from using vector graphics?
    8·1 answer
  • Construct pseudocode for a program that prints ‘Hello World’ on the screen.
    7·2 answers
  • What should you do before using a website to store student information ? A. Read and understand the website’s privacy contract
    11·2 answers
  • Habilidades de la alfabetizacion digital?
    12·1 answer
  • The Excel application is used to create
    7·1 answer
  • Pls help I don’t know the answers
    15·1 answer
  • Name at least 3 different portable computer devices that can be purchased
    15·2 answers
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!