Which method of backing up digital photographs is most prone to data loss due to software glitches? O online backup O fireproof safe O internal hard drive O external hard drive​

Answers

Answer 1

Answer:

External Hard Drive

Explanation:

Answer 2

External hard drive, method of backing up digital photographs is most prone to data loss due to software glitches. Thus, option (d) is correct.

What is software?

Software is the term for the intangible. The software is the most important aspect. Software is a collection of rules, data, or algorithms used to run machines and perform certain tasks. Apps, scripts, and programs that run on a mobile device are referred to as software.

According to the software in the computer are the mainly used and the upgrade basis. There was the operating system in the computer are the Microsoft Windows. There was the method to include the backing up digital photographs are the loss of the data to considerately the external hard drive was the backup.

As a result, the external hard drive, method of backing up digital photographs is most prone to data loss due to software glitches. Therefore, option (d) is correct.

Learn more about on software, here:

https://brainly.com/question/985406

#SPJ2


Related Questions

Why were different data types developed? Discuss the commonly used data types in programming languages.

Answers

Answer:

Different types of data are represented in different ways inside a computer and need varying amounts of memory to store them. Commonly used data types integer, real, character or string, and Boolean.

Explanation:

state how to transfee information from website to el processing document in computers and technology.​

Answers

Answer:

This is typically done either by downloading or by copying and pasting.

Explanation:

Create a function that takes an argument. Give the function parameter a unique name. Show what happens when you try to use that parameter name outside the function. Explain the results

Answers

Create a function that takes an argument. Give the function parameter a unique name. Show what happens when you try to use that parameter name outside the fu…

✓ def func(a):     print(a) a= 8 func(a) #Using parameter outside the function works well without producing any error.

How to be gud at Friday night funk

Answers

Answer:

There is an article on this topic.

Type in Friday Night Funkin: 10 Beginner Tips

Explanation:

A member has been asked to co-sign checks with a client employee while the company president is on vacation. Which statement about the application of the AICPA independence rules to this situation is correct

Answers

The statement about the application of the AICPA independence rules that is used in this situation is Because check-signing is a management function, independence is impaired.

What is AICPA independence rules?

The independence state that firm's partners and professional employees, have to be independent in line with the “Independence Rule” as well as others.

Note that the  statement about the application of the AICPA independence rules that is used in this situation is Because check-signing is a management function, independence is impaired.

Learn more about AICPA from

https://brainly.com/question/8026742

#SPJ1

This is an example of what type of formula?

=(D1-D17)

Question 3 options:

ADDITION


SUBTRACTION


RANGE


AVERAGE

Answers

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different types of formula functions in excel such as;

SUM

COUNT

COUNTA

IF

TRIM

MAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

How many different bit strings can be transmitted if the string must begin with a 1 bit, must include three additional 1 bits (so that a total of four 1 bits is sent), must include a total of 12 0 bits, and must have at least two 0 bits following each 1 bit?

Answers

Answer:

4

Explanation:

we know that there are three other 1 bits (as there is a total of four 1 bits) that each need to be followed by at least two 0's and thus we require another 3 blocks 100. In total, there are 12 0 bits. Since there are. 2 + 2 + 2 + 2 = 8 2+2+2+2=8 2 + 2 + 2 + 2 = 8. zeros in the blocks 100, there are. 12 − 8 = 4 12-8=4 12 − 8 = 4.

What year did apple computer introduce the first ipod?.

Answers

Apple first released the first ipod in 2001

Select the three careers in the technical aspect of digital media.
A engineering
B Advertising
C coding
D server maintenance
E journalism

Answers

Engineering, coding, server maintenance are three careers in the technical aspect of digital media. Through numeric encoding and decoding of data, video, audio, software, or other content is created, modified, saved, or accessed in digital form.

What is digital media?

Digital media is a mix of technology and content, and creating digital media products necessitates a multi-skilled team.

Digital media dissemination will soon overtake conventional newspaper, magazine, and book sales. Digital photographs, Digital books, Websites and Blogs,  are some example of Social Media.

Thus, A, C and D are correct.

For more details about digital media, click here

https://brainly.com/question/17858199

#SPJ1

Answer:

engineering, coding, server maintenance

What is the difference between HTML and XML?

HTML and XML are two common markup languages. HTML is primarily used for
. XML is primarily used for

Answers

Explanation:

HTML displays data and describe the structure of a webpage while XML stores and transfers data.

You are responsible for creating a database with information about each state in the United States as well as three cities in each state. You will include information on population, primary industry, and area in square miles. How should you set up the database? Use one large table containing all information. Use several interrelated tables. Use one table for each city and each state.

Answers

Answer:gps trends are like the images that are being displayed on the map.

Explanation:

Part B How could installing new technology, such as scrubber machines, affect the factories required to install them? Name a positive and a negative consequence. pls help need done by end of week

Answers

Answer:It will decrease harmful emissions, so the factories will no longer need to install them.

Explanation:

This helps improve the safety of the surrounding community and workers. But this technology is expensive and required time and effort to install.

Answer:

Installing new technology, such as scrubbers, in factories will decrease their harmful emissions. This helps improve the safety of the surrounding community and the workers. But this technology is expensive and requires time and effort to install.

Write an algorithm in pseudocode to input 500 positive whole numbers. each number input
must be less than 1000. find and output the largest number input, the smallest number input
and the range (difference between the largest number and smallest number).
use only if/then else

Answers

Answer:

cómo dijo todos los que preguntan no entiendo porque hablan inglés hablan español por favor

Which version of HTML provides the lowest common denominator of HTML tags

Answers

Answer:

HTML 1.0.

Explanation:

The basic version of HTML has support for basic elements like text

The version of HTML provides the lowest common denominator of HTML tags is HTML 1.0. The correct option is C.

What is HTML?

Not being a programming language, HTML. A markup language is used. In fact, HyperText Markup Language is the name of the technology.

The coding that organizes a web page's content is called HTML (HyperText Markup Language). Content may be organized using paragraphs, a list of bulleted points, graphics, and data tables, for instance.

The first version of HTML was written by Tim Berners-Lee in 1993. Since then, there have been many different versions of HTML.

Therefore, the correct option is C, HTML 1.0.

To learn more about HTML, refer to the link:

https://brainly.com/question/24065854

#SPJ2

The question is incomplete. Your most probably complete question is given below:

HTML 2

HTML 4.01

HTML 1.0

HTML 3.2

The __str__ method of the Bank class (in bank. Py) returns a string containing the accounts in random order. Design and implement a change that causes the accounts to be placed in the string in ascending order of name. Implement the __str__ method of the bank class so that it sorts the account values before printing them to the console. In order to sort the account values you will need to define the __eq__ and __lt__ methods in the SavingsAccount class (in savingsaccount. Py). The __eq__ method should return True if the account names are equal during a comparison, False otherwise. The __it__ method should return True if the name of one account is less than the name of another, False otherwise

Answers

class Bank(object):

   def __str__(self):

       """Return the string rep of the entire bank."""

       #get a sorted copy of the list

       #using default SavingAccount comparison            

       pTemp =sorted(self._accounts)

       return '\n'.join(map(str, pTemp))

During prereading, it is not important to pay attention to visual aids. please select the best answer from the choices provided t f

Answers

Answer:

its false

Explanation:

Answer:

False is correct

Explanation:

Assuming a 32bit processor If I have a double pointer defined as dPtr and I add 1 to it. How many bytes are added to the address

Answers

Answer:

Theoretically one could design an architecture that would address 16 GB of memory with 32-bits of unique addresses.

Explanation:

A pointer is used to hold the address of variables, since it points to a location in memory. In light of this, we define a pointer to a pointer.

What double pointer defined as dPtr, and I add 1 to it?

A pointer to a pointer can be used to modify the values of regular pointers or to build a 2-D array with adjustable dimensions. In the memory stack, a double pointer takes up the same amount of room as a regular pointer.

The address of the variable is kept in the first pointer. Additionally, the address of the first pointer is kept in the second pointer. They are also referred to as double-pointers because of this.

When we want to modify or change the pointer's value, we can also use double pointers. In general, double pointers are used to hold or reserve memory allocations or assignments. This can be done even outside a function call by simply passing these functions ** parameter.

Therefore, Theoretically, an architecture may be created that uses 32 bits of unique addresses to address 16 GB of memory. dPtr += 1; 4 16 1 8; Double* dPtr = &myDouble;

Learn more about double pointer here:

https://brainly.com/question/19517226

#SPJ2

Which of the following BEST describes a permissive software license?

A. Anyone can use and modify the software freely. There are no restrictions.

B. Anyone can use the software, but there are restrictions on how it can be modified.

C. Anyone can use and modify the software, but any new versions must have the same license as the original.

D. Users must pay for the software and do not have the right to modify It or redistribute it.

Answers

Answer:

B

Explanation:

A permissive software license is a free-software license which carries a minimal restrictions on how the software can be used, modified, and redistributed, usually including a warranty disclaimer.

I hope this helps.

Please rate me brainliest.

Select all the correct answers.
Hans is works for a software company that is developing a banking service that employs online transaction processing. What are two advantages
of using this technology?
•It is simple to implement due to redundancy.
•It allows customers to access the service from any location.
•It experiences minimal losses during downtime.
•It provides a secure environment for transactions.
•It processes a transaction even if part of the transaction fails.

Answers

Banking services are monetary transaction that includes the deposit and withdrawal of money. The online transaction process allows one to access services in any place and secure transaction environment.

What is an online transaction?

Online transactions are the transfer of money on the cloud platform using internet services. The financial transactions are done on the web banking platform that includes money transfers, bill payments, shopping, etc.

Online transactions do not require physical presence and can be done at any place irrespective of the location the money gets transferred to the person. Also, it provides a secure environment to transact any amount.

Therefore, a secure environment and access to services at any place are the two advantages of online transactions.

Learn more about online transactions here:

https://brainly.com/question/24192124

#SPJ1

Answer:

a

Explanation:

what the first guy said

What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems

Answers

Answer:

packet sniffer

Explanation:

Q:

What tool would you use if you want to collect information as it is being transmitted on the n…

a. content filter

b. vulnerability scanner...

A:

packet sniffer

How communication skills are different from self management skills

Answers

Answer: Self-management aptitudes are those characteristics that offer assistance an representative to feel and be more beneficial within the work environment compare to self-management expertise is our capacity to oversee our behaviors, considerations, and feelings in a cognizant and beneficial way.

Explanation:

Answer: Self-management skills are those characteristics that help an employee to feel and be more productive in the workplace compare to self-management skill is our ability to manage our behaviors, thoughts, and emotions in a conscious and productive way.

Explanation:

what is a fandango confirmation number for? Like do i need to confirm something? Right after my pruchase i got an email saying "Fandango Purchase Confirmation" what should I do?

Answers

Answer:

Confirmation numbers are given out so that if there is ever a problem with your purchase, they can pull up the transaction on their end. It's simply an identifier for the transaction. If they ever need to validate that it is truly your purchase, they will ask for the confirmation number. You don't need to do anything, just pull up the ticket when you get to the theatre and let them scan it off your phone. You should be able to add it to your Apple Wallet if you use that (makes it easy).

1- Identify the face expressions is considered....

A) Classification problem
B) Clustering Problem
C) Regression Problem

Answers

Answer:

C) Regression Problem

Hope this helped you!

What should a pie chart represent?

data that steadily increases
data that adds up to 100%
a set of unrelated data
a list of items that frequently changes

Answers

Answer:

Data that adds up to 100%

Explanation:

While browsing the internet, you notice that the browser displays ads linked to recent keyword searches you performed. which attack type is this an ex

Answers

Answer:

Adware

Explanation:

Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overlapped) access, what is the average access time for the processor to access an item

Answers

Answer:

29ns

Explanation:

Q:

12. Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overlapped) access, what is the average access time for the processor to access an item?

A:

Answer: 29ns

To query the database means to _____.


check for mistakes in the data

ask a question about the data

sort the data into a certain order

create a new database

Answers

Explanation:

to retrieve data or change information in a database, such as adding or removing data

When researching Information about technology for use in a project, it is NOT important to consider the date that the information was
published.

OA True
OB. False

Answers

Answer:

B. False

Explanation:

Hope this helps!

What threat do insiders with authorized access to information?

Answers

Answer:

An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage

Explanation:

Dr. Bloom is writing a test for a history class and wants to ask a question that will have a Boolean value for the answer. Which of these should Dr. Bloom use?

Answers

Answer:?The answer is c: multiple  choice questions.

Explanation:

Dr. Bloom is writing a test for a history class and wants to ask a question that will have a Boolean value for the answer. Which of these should Dr. Bloom use.

I fill like he should use this if he had a test for history class because it really makes sent and that what a lot of teacher when its time for a test. When its a test you weren't supposed to use short answer you were supposed to use big answers.

Other Questions
why were most black American unable to vote in Alabama ? give examples.help help help help please PLEASE HELP!!!Put these steps of a research plan into the correct order.Revise your paper.Conduct researchPublish your paper.Draft your paper.Choose a topic. I need help on these 3 problems cause Im stuck on them someone pls help Kya has finished creating her company's annual budget. Before presenting it to her colleagues, she adjusts the margin widths and changes thefont size and color. The changes that she has made are examples of:O A formattingOB. editing.OC publishing.OD. networking examples of irrational numbers that result into rational numbers when squared equation point-slope form y=4x+17 Sperm are produced in the __________ by a process called ______. a. testes, spermatogenesis b. scrotum, spermatogenesis c. epididymis, spermatogenesis d. testes, epididymis Mechanical energy is as much of potential and kinetic energy. Mechanical energy is never lost but only transformed from one form to another. As long as all the mechanical energy is as much as the potential energy then the kinetic energy is 0J. The mechanical energy of an object is found by summing its potential energy and kinetic energy. Drag values to complete each equation.y5y3(y2)4 = (y2)4+y3y5 Click this link to view O*NETs Skills section for HelpersProduction Workers. Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, which common skills are needed by HelpersProduction Workers? Select two options.active listening sciencecritical thinkinginstallationtechnology designmanagement of financial resources Identify the limitations of the carbon model(s) in accounting for all ofEarth's carbon. what would Z equal to 13(z + 16) = 949 Which Absolute monarch used their power the most to benefit their society?please help "A bill of rights...serves to secure the minority against the usurpation and tyranny of the majority." who would say this? How does tan build a central idea of her story in the excerpt? tan discusses her thoughts about language to build the idea that the english language does not have words to match some chinese terms. tan discusses her relationship with her mother to build the idea that mothers and daughters in all cultures often have misunderstandings. tan discusses her mothers use of english to build the idea that a form of language can be purposeful and meaningful even if it is nonstandard. tan discusses the english language to build the idea that there is a lack of appropriate synonyms for the word ""broken."" The molar mass of AlCl3 is 133.34 g/mol. How many molecules of AlCl3 are there in 2 g? Complete the square to write y = 3x2 12x 7 in vertex form, y = a(x - h)2 k. y = 3(x2 4x) 7 y = 3(x2 4x 4) 7 - when the above expression is written in vertex form, a is , h is , and k is . A particular battery claims to have a mean life of 400 hours with a standard deviation of 30 hours. Approximately what percent of the batteries will last more than 420 hours? Calculus - need work shown Which of the following statements best defines a construct: Question 3 options: a) Operationalized components of a particular theory b) Systematic view of events that specifies relations among variables c) A model of health behavior change that integrates multiple theories d) Theories that apply to a specific problem, audience, and context