1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
15

Older Microsoft disk compression tools, such as DoubleSpace or ____, eliminate only slack disk space between files.

Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
6 0
I believe the answer is SDelete
You might be interested in
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate exec
k0ka [10]
Virus                    <span> </span>
4 0
4 years ago
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
stiks02 [169]

I think AAAAMMMMMHHVVV

i think suppose to be 3 v's

3 0
3 years ago
Read 2 more answers
Need help not sure if I’m correct
77julia77 [94]

Answer:

First and the second option

8 0
3 years ago
Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete
TiliK225 [7]
Your answer that your looking for it letter A! I hope this helped c:
5 0
3 years ago
Read 2 more answers
Other questions:
  • What does DOS stand for?
    15·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·1 answer
  • Which of the following types of memory extends the actual physical memory of a computer by copying blocks of data from the memor
    11·1 answer
  • Which of the following is a device that plugs in a usb port on the computer or mobile device and contains multiple usb ports?
    9·1 answer
  • Which entity has the principal responsibility to control the execution of processes?
    14·1 answer
  • Software engineers typically use UML as a principle means of explaining design. UML stands for:
    12·1 answer
  • To calculate subtotal for a table, the first step is to use the ____ button on the table tools design tab.
    15·1 answer
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    14·1 answer
  • What is a benefit of using a client/server network?
    7·1 answer
  • You have a server that has a 100basefx network interface card that you need to connect to a switch. the switch only has 100baset
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!