1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
10

Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie

ve that data. Which preventive measure did he fail to take?
A.) He didn’t clean his hardware.
B.) He did not update the drivers.
C.) He did not organize his data.
D.) He did not create a backup of his data.
Computers and Technology
2 answers:
Elan Coil [88]3 years ago
8 0
I believe the answer would be D. because if he had created backup files he would still have his data.
hope this helps☺
katrin [286]3 years ago
5 0
D he didnt have backup obv

You might be interested in
Analyze the following code. Number[] numberArray = new Integer[2]; numberArray[0] = new Double(1.5); Question 9 options: A) Sinc
sleet_krkn [62]

Answer:

B) At runtime, new Integer[2] is assigned to numberArray. This makes each element of numberArray an Integer object. So you cannot assign a Double object to it.

Explanation:

The Number class in Java is the superclass for the numbers. Once it is set to the Integer object, the values in <u>numberArray</u> must be all integers, we know that arrays can hold one type of value in Java. Assigning a double value is not allowed in this situation.

7 0
3 years ago
What are the advantages of using digital signals over analog signals? Scientist have found advantages when they convert digital
Viktor [21]

Answer:

Hope it Helps

Explanation:

Brainliest please

6 0
3 years ago
Read 2 more answers
In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
spayn [35]
Hello <span>August1859 
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.

Hope This Helps!
-Chris
8 0
3 years ago
Java code?????
12345 [234]

Answer:

Explanation:

Here is the code for you:

import java.io.*;

import java.util.*;

class GirlScoutCookies

{

public static void main(String[] args)

{

int [] BoxesCategory = new int[5];

Scanner sc = new Scanner(System.in);

System.out.print("Total number of girls in the troop: ");

int numOfGirlScouts = sc.nextInt();

for(int i = 0; i < numOfGirlScouts; i++)

{

System.out.print("Boxes of cookies for girl #"+(i+1)+": ");

int boxes = sc.nextInt();

if(boxes >= 0 && boxes <= 10)

BoxesCategory[0]++;

else if(boxes >= 11 && boxes <= 20)

BoxesCategory[1]++;

else if(boxes >= 21 && boxes <= 30)

BoxesCategory[2]++;

else if(boxes >= 31 && boxes <= 40)

BoxesCategory[3]++;

else if(boxes > 40)

BoxesCategory[4]++;

}

System.out.println("TOTAL BOXES\tNUMBER OF GIRL SCOUTS");

System.out.println(" 0 to 10\t"+BoxesCategory[0]);

System.out.println("11 to 20\t"+BoxesCategory[1]);

System.out.println("21 to 30\t"+BoxesCategory[2]);

System.out.println("31 to 40\t"+BoxesCategory[3]);

System.out.println("41 or more\t"+BoxesCategory[4]);

}

}

And the sample output is:

5 0
3 years ago
Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
mr Goodwill [35]
The answer is : Weighted application blanks

Job board is a type of system in which the employers set up a list of requirements for the job hunter

Weighted Application blanks is used to to collect background information from the job applicants, which is not a part of job board
6 0
3 years ago
Other questions:
  • Hard drives are usually self-contained, sealed devices. Why must the case for the hard drive remain sealed closed?
    8·1 answer
  • Given that the time to read data off a 7200 rpm disk drive will be roughly 75% of a 5400 rpm disk, at what idle time of the 7200
    13·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • What are computer crimes?​
    14·1 answer
  • SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and su
    7·1 answer
  • What<br>are<br>the features of secondary storage media​
    13·2 answers
  • Which is the following should be selected in the paragraph dialogue box to prevent page break from occurring within a paragraph
    12·1 answer
  • Please tell fast plzzzzzzzz​
    9·2 answers
  • Compare gigabytes GB, kilobytes and terabytes.​
    11·1 answer
  • Fields &amp; Methods
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!