Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hurry!!!

Answers

Answer 1

Explanation:

Every month or so

Answer 2
I guess it is once a month.
Thank you!

Related Questions

On Monday, you log into your computer at work, but you are not able to access any network resources. You run ipconfig and see that your address is 169.254.18.53. What is the most likely cause of the problem

Answers

Answer:

Ip address which starts with 169.254 are special kind of addresses. when computer asks for a IP address and nothing responds to it gives itself something called APIPA( Automatic Private Ip Addressing). this IP is having very limited connectivity. since your machine made up your own address nobody would know where to send data and etc.

Explanation:

simply your machine cannot reach DHCP (dynamic host configuration protocol) server over the network

i know i know i should be asking a question HOWEVER i have a task for you... PLAY LEGEND OF ZELDA BREATH OF THE WILD AND I"LL GIVE YOU BRAINLIEST!!!!!!

Answers

Answer: who doesnt play that down right amazing game?

Explanation: it is perfection

Answer:

I ALREADY HAVE OVER 1000 HOURS ON THE GAME! I STARTED IN 2019

Explanation:

Best game ever

"If possible, always bring print-outs of your slides for your audience
members." Is this good advice?
A. If you can, this is always recommended, unless you are assured
everyone will have a tablet and you can share the files online.
B. No, this is not good advice since handouts rarely help the
audience in any manner. The only thing that matters is what the
speaker says.
C. Not really, since it is a lot of work, requiring a lot of paper, and
most people will not need the handouts.
D. Not really, because audience members will never need to review
slide information.

Answers

Answer:

Answer is A I just take the quiz.

Unless you are certain that everyone will have a tablet and can share the files online, it is always suggested to carry the print-out files of the slides.

Why it is important to bring the print-out files of the slides?

When the slides have a lot of component part, it's a good thought to overlap the copies of the presentation. A presentation is a misfortune medium for communicating ecumenical information.

If the audience has print-out files of the slides, they will be more focused on the themes that want to express rather than recalling every detail.

Unless a person knowing for sure that everyone will have a tablet and will be able to share the files online, it is always a good idea to have the print-out files of the slides with you.

Therefore, option A is correct.

Learn more about the audience, refer to:

https://brainly.com/question/1802560

#SPJ2

I’ll mark brainliest if correct

Select the correct answer.
Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?

A. SQL-Integrity Check

B.Unified Modeling Language

C.Selenium

D.Perforce

Answers

Answer:

I believe the answer is B

Explanation:

The symbols on the numeric row are secondary characters accessed with the shift key.
True or False?

Answers

Answer:

I've never used the shift key, I'd say false.

True, because they are the extra keys that can't go anywhere else.

. This part of your program is active only when 3SS is in the POS 3 position: a) A start/stop memory circuit utilizing 5PB, 7PB and B3/30 (B3/30 OTE is the memory coil). b) When B3/30 is energized: . Light 3LT, on the console, shall continuously blink on and off anytime B3/30 is energized. The on time shall be 0.3 seconds and the off time shall be 0.6 seconds. This shall be accomplished using a 0.05 second (preset) free running timer (T4:31) and two cascaded counters (C5:31 & C5:32). The free running timer shall operate the first counter until it is done. When the first counter is done, it stops counting and engages the second counter to count. . A Count-Up, Count-Down, Count-Reset circuit shall be permitted to operate when B3/30 is energized. The counter circuit shall utilize 6PB, 8PB and IPBLT (when pressed) to activate the CTU, CTD and RES respectively of C5:33. 1 The Accumulated value of the counter shall be displayed on the LED display whenever B3/30 is energized. (C5:33) . The Preset value of the counter is loaded from the thumbwheel when 4PBLT is pressed and B3/30 is energized. (C5:33) . When the counter accumulator is greater than or equal to the preset, the horn shall cycle on and off for five cycles (on for five time periods and off for five time periods) and then remain off. (C5:34, T4:32 & T4:33) If the counter accumulated value should go below the preset and then count up to the preset, the horn cycle shall . repeat. . The horn "on time", in hundredths of a second, shall be set from the thumbwheel when 2PBLT is pressed while B3/30 is energized. (T4:32) . The horn "off time", in hundredths of a second, shall be set from the thumbwheel when 3PBLT is pressed while B3/30 is energized.

Answers

The given program controls the function of the 3SS when it is in POS 3. The following are the controls included in this program:1. A start/stop memory circuit utilizing 5PB, 7PB, and B3/30 (B3/30 OTE is the memory coil).2.

A counter circuit that has a count-up, count-down, count-reset circuit which utilizes 6PB, 8PB, and IPBLT (when pressed) to activate the CTU, CTD, and RES, respectively, of C5:33.3. A display circuit that displays the Accumulated value of the counter on the LED display when B3/30 is energized.4.

A preset circuit that loads the preset value of the counter from the thumbwheel when 4PBLT is pressed and B3/30 is energized.5. A horn cycle circuit that cycles on and off for five cycles when the counter accumulator is greater than or equal to the preset.6. The horn "on time", in hundredths of a second, is set from the thumbwheel when 2PBLT is pressed while B3/30 is energized.7. The horn "off time", in hundredths of a second, is set from the thumbwheel when 3PBLT is pressed while B3/30 is energized.

The function of the program is to enable the 3SS to operate efficiently when in POS 3, by using various circuits to control its functions and settings.

Learn more about program controls at https://brainly.com/question/29993725

#SPJ11

program that shows if it's an integer or not​

Answers

isInteger() method returns true if a value is an integer of the datatype Number. Otherwise it returns false

chris is a marketing manager at the pet box, which offers subscription boxes for pet owners. chris wants to increase traffic to the pet box's main product page. right now that page ranks on the second page of search results for their target keyword. chris has started improving the on-page seo of the page, optimizing it for their target keyword, and seeking backlinks from popular pet care blogs. in order to track progress towards their goal, which metrics should chris track?

Answers

Organic traffic, position, impressions, backlinks are the required metrics the should be tracked by chris.

What is Organic traffic?

Organic traffic refers to visitors who arrive at your website through unpaid channels, i.e. free traffic. Search engines such as Go-ogle, Ya-hoo, and Bi-ng are examples of organic sources or organic searches.

Search Engine Optimization is a type of digital marketing that focuses on increasing organic traffic. It boosts website trust and has higher conversion rates than paid traffic because organic searches have higher intent. Organic traffic has a very high ROI because it is semi-permanent in nature, as opposed to paid ads.

To learn more about Organic traffic, visit: https://brainly.com/question/29358124

#SPJ4

Which of these is a common problem with data transmission? a.File format b.Network Speed c.File size d.Data routing

Answers

Answer:

Answer is b

Explanation:

a. File format had nothing to do with the data transmission

c. File size matters only if the network speed is low, so, it again a fault of network speed.

d. Data routing has noting to do with data transfer, only network routing is required.

A car dealership needs a program to store information about the cars for sale. For each car, they want to keep track of the following information: number of doors (2 or 4), whether the car has air conditioning, and its average number of miles per gallon. Which of the following is the best object-oriented program design?

i. Use one class, Car, with three instance variables:

int numDoors, boolean hasAir, and

double milesPerGallon

ii. Use four unrelated classes: Car, Doors, AirConditioning, and MilesPerGallon.

iii. Use a class Car with three subclasses: Doors, AirConditioning, and MilesPerGallon.

iv. Use a class Car, with a subclass Doors, with a subclass

AirConditioning, with a subclass MilesPerGallon.

v. Use three classes: Doors, AirConditioning, and MilesPerGallon, each with a subclass Car.

Answers

In the question given, a car dealership requires a program to store information regarding the cars for sale. Below are the options given regarding the best object-oriented program.

The correct option is 2 .

Use a class Car with three Use a class Car, with a subclass Doors, with a subclass  with a subclass . Use three classes: Doors, each with a subclass Car. Among the above mentioned choices, option  would be the best object-oriented program design. It's because we can use one class,

Car, with three instance variables, as we don't require different objects for doors, air conditioning, and miles per gallon, we can simply use instance variables for them in the Car class. Thus option i is the best object-oriented program are the options given regarding the best object-oriented program  Use four unrelated classes Car, Doors.

To know more about object-oriented  Visit:

https://brainly.com/question/31741790

#SPJ11  

the weekly question would you rather be the smartest but ugliest at your school or most handsome but not smart.

Answers

Answer:

lol I would be the most handsome but not smart

Explanation:

Answer:

Imao- i'd be the most handsome(cute) but not smart.

Explanation:

have a great weekend ( ̄▽ ̄)ノ

When it comes to credit scores, why is having a
thin file NOT good?
What reasons might an 18-year-old have for
his/her thin file?

Answers

Answer:

credit karma

Explanation:

karma is -69

what is email?
An email is a message sent from one device ( computer or smartphone to another over the internet by using the mailing address of senter and recipient.

Answers

Email addresses are used to send emails from one user to another over the internet that can contain text, photos, and attachments.

A message transferred from one computer to another via the internet is an email, right?

A computer application called e-mail enables users to exchange messages with one another in order to communicate. Thanks to a worldwide email network, people may communicate via email quickly. E-mail is a letter's electronic equivalent and has the advantages of flexibility and promptness.

What is a Mcq email response?

Email, often known as E-mail, is a technique of communicating with others using electronic devices to exchange messages.

To know more about Email addresses visit:-

https://brainly.com/question/14714969

#SPJ1

How many modifier / mutator methods are there in class Check?
public class Check
{
private int one, two, total;
public void setNums(int n1, int n2)
{
one = n1;
two = n2;
}
public void add()
{
total = one + two;
}
public int getTotal()
{
return total;
}
}
ANSWERS:
0
4
3
1
2

Answers

There are two modifier/mutator methods in the class Check: setNums(int n1, int n2), and add (). One other accessor method is getTotal().

What does a mutator method's header look like?

Before the method name in its header is the keyword void. A void method that modifies the values of instance variables or static variables is called a mutator method.

What actions constitute "mutators"?

In computer science, a mutator method is a mechanism for controlling changes to a variable. They're also known as setter methods quite a bit. Frequently coming after a setter, a getter (also known as an accessor) returns the value of the private member variable.

To know more about methods visit:-

https://brainly.com/question/30026107

#SPJ1

Find out how to print the below pattern in python and also come up with pseudocode,
you have to use for loop for this, you can use a for loop inside the outer for loop.
You can't use operator like " *" in python , only use print statement to print the below pattern. Find out how to print in 5 lines one by one in python , there is a way to print one line then next
X

XXX

XXXXX

XXXXXXX

XXXXXXXXX

Answers

Answer:

for i in range(5):

   for j in range(2*i + 1):

       print("*", end="")

   print()

Explanation:

for row index going from 0 to 5
           for column index going from 0 to 2*row index + 1
                      print * suppressing new line

          print a new line to move to next row

How many panes can pablo view in a spreadsheet if he chooses the split worksheet option?

Answers

A worksheet can be divided horizontally, and the resulting windows appear opposite one another on the screen.

What is the purpose of a spreadsheet?

A spreadsheets is a piece of software that can store, display, and edit data that has been organized into rows and columns. The spreadsheet is among the most used applications for personal computers. In general, a spreadsheet is made to store statistical data or short text strings.

What does a spreadsheet formula mean?

A formula in Microsoft Excel is an equation that modifies values in a set of cells. These formulas still return a result even if it's inaccurate. You may execute calculations like addition, subtraction, arithmetic, and division using Excel formulae.

To know more about spreadsheet visit:

https://brainly.com/question/8284022

#SPJ4

describe at least five ways in which Information Technology can help students studying subject other than computing ​

Answers

Answer:

‘Computer Science’ and ‘information technology’ are completely different subjects. Information Technology (IT) is-

(i) the study,

(ii) design,

(iii) development,

(iv) implementation, and

(v) support or management

of computer-based information systems, particularly software applications and computer hardware.

Information Technology (IT) deals with the use of electronic computers and computer software to-

(i) convert,

(ii) store,

(iii) protect,

(iv) process,

(v) transmit, and

(vi) securely retrieve information.

Shortly, information technology (IT) itself means learning to use technology in business or in studies of some subject matter using technology.

Hence, IT could help students studying subjects other than computing with the above mentioned points considered.

Which one of the following is a type of network security?
a) Login Security
b) Rights Security
c) Both (a) and (b)
d) Neither (a), nor (b)


Answers

Answer:

I think it's (login security)

Using n threads within a single process is more efficient than using n separate processes because _____.

Answers

Using n threads within a single process is more efficient than using n separate processes because threads share the same memory space, which allows for better communication and coordination between the threads.

This sharing of memory means that threads can easily access and modify shared data structures without the overhead of inter-process communication that is required when using separate processes. Additionally, because threads are lightweight compared to processes, they require less overhead and resources to create and manage. This means that a single process can manage multiple threads more efficiently than multiple processes. Another advantage of using threads within a single process is that it allows for better utilization of the CPU. Because threads share the same memory space, they can easily switch between each other, allowing for parallel execution on a single CPU. In contrast, when using separate processes, each process would require its own CPU, which can result in inefficient use of resources.

Overall, using threads within a single process is more efficient than using separate processes because it allows for better communication, coordination, and utilization of resources. This is especially true when dealing with applications that require frequent access to shared data structures or when there is a need for parallel execution on a single CPU.

Learn more about CPU here-

https://brainly.com/question/16254036

#SPJ11

The harm of stereotypes are likely to be aggravated in

Answers

Answer:

conflict situations

Answer:

B. Conflict situations

Hope this helps!

Explanation:

What are the key learnings and action plans in Giovanni
Gavettii, Rebecca Henderson, Kodak and the Digital Revolution (A)
HBSP # 705448.

Answers

1. Embrace technology: Kodak's failure to adapt to the digital shift highlights the importance of embracing new technologies and staying ahead of industry trends. Companies should invest in research and development to innovate and evolve with changing market demands.

2. Customer-centric approach: Kodak's focus on film and neglecting digital photography demonstrated the need to prioritize customer preferences and adapt products and services accordingly. Understanding and addressing customers' changing needs is crucial for long-term success.

3. Strategic partnerships: Collaborating with technology companies could have helped Kodak stay competitive in the digital space. Forming strategic alliances and partnerships can provide access to expertise, resources, and new markets. Agility and flexibility: Kodak's inability to quickly respond to the digital revolution highlights the importance of being agile and adaptable.

To know more about technologies visit:

https://brainly.com/question/9171028

#SPJ11

why we have to maintain the good condition of tools and equipment?​

Answers

Answer:

Construction tools and equipment suffer a lot of wear and tear. Hence, it is important to maintain them regularly. This will help increase the service life as well as the performance of the equipment. Precautionary maintenance of tools and equipment will also help reduce unwanted expenses related to broken or faulty equipment

Explanation:

A set of data with a correlation coefficient of -0.855 has a a. moderate negative linear correlation b. strong negative linear correlation c. weak negative linear correlation d. little or no linear correlation

Answers

A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Thus, A correlation coefficient gauges how closely two variables are related to one another. The Pearson coefficient, which has a range of -1.0 to +1.0, is the correlation coefficient that is most frequently employed.

Two variables that have a positive correlation tend to move in the same direction. Two variables with a negative correlation tend to move in the opposing directions.

While a correlation value of -0.3 or lower shows a very weak association, one of -0.8 or lower suggests a strong negative relationship.

Thus, A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Learn more about Corelation, refer to the link:

https://brainly.com/question/30116167

#SPJ4

what communications technology utilizes packet switching and virtual connection techniques to transmit at rates from 56 kbps to 45 mbps?

Answers

The communication technology that utilizes packet switching and virtual connection techniques to transmit at rates from 56 kbps to 45 mbps is Asynchronous Transfer Mode (ATM).

What is Asynchronous Transfer Mode (ATM)?

ATM stands for Asynchronous Transfer Mode, a high-speed communication protocol designed for the efficient conveyance of both voice and data traffic.

The protocols that use virtual connection techniques and packet switching to transmit data traffic are packet-switching technologies. In ATM, these approaches are combined to create a connection-oriented communication protocol that transmits data traffic at speeds ranging from 56 Kbps to 45 Mbps.

In comparison to other communication protocols, ATM is an extremely efficient protocol that can quickly transmit a large quantity of data in a short amount of time

Learn more about Asynchronous Transfer Mode at:

https://brainly.com/question/24229418

#SPJ11

With the knowledge of computer studies or ICT mention two methods of keeping material​

Answers

Answer:

ICT teaching tools include simulation, modelling, CD-ROMs, teacher web publishing, word processing, spreadsheets, data logging, databases, e-mail, smart boards, interactive whiteboards and Internet browsing.

Explanation:

Using the Internet comes with certain risks that you should be prepared for. True False​

Answers

True true and true u can get catfished or be talking to a 78 y/o man like me am I a person or a old piece of hag

9. 1 Lesson Practice - python


An element in a 2D list is a ______


Please. Help

Answers

An element in a 2D list is a value that is located at a specific row and column in the list.

What is a 2D list in Python?

A 2D array is a nested data structure, or a collection of arrays inside another array, in Python. Most frequently, data in a tabular or two-dimensional format is represented using a 2D array.

How to use Python to plot a 2D array

Set the padding between and around the subplots, as well as the figure size.Create 100 x 3-dimensional random data.Data can be plotted using a 2D numpy array using the scatter() technique.Use the show() function to display the figure.

Learn more about Python at: https://brainly.com/question/26497128

#SPJ4

What does a driver do?

Answers

A driver is a piece of software that allows things such as a keyboard, mouse, hard drive, etc. connect to a computer. Normally found on the manufactures website, you can update drivers with advanced and modern technology. Or, if a device is really old you can download a driver to allow that device to connect to a PC.

Prompt
What is a column?

Answers

Answer:

A column is a vertical group of values within a table. It contains values from a single field in multiple rows. ...

A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Why prompt is used?

Since we can choose only one of the prompts, let's work with prompt A. We can answer it in the following manner edgar Allan Poe believed that a good short story must have a single, unifying effect. He did apply that concept to his own short stories. Let's briefly analyze "The Fall of the House of Usher."

In the story, every element contributes to the story's effect: the setting, the characters, the dialogue, the word choice and the mood, among others. From the beginning, the narrator describes an "oppressive" weather. He proceeds to let us know that his friend Usher looks sick and strange. The house where Usher lives is also quite eerie. And to top it all, Usher's sister, who was buried alive, has returned for revenge.

Poe believed a good short story should possess a single, unifying effect, and that everything in the story should contribute to that effect. He achieves that in his short stories, where every element (characters, setting, imagery, word choice, etc.) contributes to the feeling of tension, anxiety, even horror.

Therefore, A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Learn more about element on:

https://brainly.com/question/14347616

#SPJ2

what type of scenario would be best served by using a platform as a service (paas) cloud model? question 6 options: a) a group of developers needs access to multiple operating systems and the runtime libraries that the os provides.

Answers

Multiple operating systems are required, as well as the runtime libraries each OS offers, for a team of developers.

What does operating system mean?

An operating system (OS) is a piece of software that controls all other application programs in a computer after being originally loaded by a boot program. Through a specified application program interface, the application programs use the operating system by requesting services (API).An operating system is a group of applications that manages how computer hardware and software operate.When man and machine are in contact, it serves as a bridge. Windows, Linux, BOSS, and other operating systems are a few examples.

Learn more about operating system (OS)

brainly.com/question/25143116

#SPJ4

Other Questions
why is cash flow considered a more accurate indicator of a project's benefit to a company than net income? A quality-conscious disk manufacturer wishes to know the fraction of disks his company makes which are defective. Step 1 of 2: Suppose a sample of 7002 floppy disks is drawn. Of these disks, 6232 were not defective. Using the data, estimate the proportion of disks which are defective. Enter your answer as a fraction or a decimal number rounded to three decimal places. Step 2 of 2: Suppose a sample of 7002 floppy disks is drawn. Of these disks, 6232 were not defective. Using the data, construct the 99% confidence interval for the population proportion of disks which are defective. Round your answers to three decimal places. what is the principle of cross-cutting relationships? 2) The population of a small country grows according to the function P(t) = 1,300,000e0.05t, where t is measured in years. In how many years will the population grow to 2,500,000? Show answer in terms of In and as a decimal rounded to nearest tenth. Select the equation of a circle with a center at (7, -11) and a radius 8. Differences of sound waves and light waves GIVE ATLEAST TWO EXAMPLE ON EACH WAVES Which of the following describes the mRNA molecule produced from transcription?The mRNA molecule is made using the coding strand of DNA, which depends on the gene beingtranscribed.O The mRNA molecule is made using the coding strand of DNA and is transcribed in the paralleldirectionThe mRNA molecule is complementary to its DNA template, which depends on the gene beingtranscribed.O The mRNA molecule is identical to its DNA template, which depends on the gene being transcribed. 6. What is the expected product from the reaction of potassium with oxygen? K2O2 K2OKOz after graduating from one of the highest-ranked business schools in the world, alfred was hired as a divisional marketing manager at a computer hardware company. his job profile included planning the marketing activities for the next fiscal year, allocating funds, and overlooking the performance of marketing representatives. in the given scenario, alfred was most likely hired as a . 6 + 9 = 33Need to solve A firms technology is given byf(L, K) = LK + L + K, for which MPL(L, K) = K + 1 and MPK(L, K) = L + 1. Derive the formulas for APK(L, K) and MRTS(L, K). Regarding your second research paper, you have to Discuss how Insurtech enables firms to achieve their ambitions across the ESG spectrum, Report requirements: 1. You can work in a group of five maximum, individual submissions will not be accepted. 2. The report should only be in English. 3. The report should be written in your own language as plagiarism and academic integrity are seriously considered. 4. Please submit 2 copies of your report; one as a hard copy in the class, and the other copy must be sent through Ritaj. 5. You should write no minimum than 1000 word 6. you should add all the references you use the cost of living is 230% of what it was 10 years ago. what mixed number is this? which of the following scenarios contain a contingent liability ?- company A has a probable obligation arising from current events, but which will only be realized on set future events which are not yet certain to occur-company c has a possible obligation arising from past events but which only be realized based on a set future events which are not yet certain to occur- comapany b has a certain obligation arising from past events that will only be realized when a set future event or events occur- company d has a certain obligation arising from past events that will only be realized based on set future events which are not yet certain to occur I need help creating a WBS and Gantt chart. For my project, I am opening a Day Spa. I have level one identified. Planning 1.1, Location 2.1, Financing 3.1, Equipment 4.1. I need help with the following deliverables. Which of the following is NOT a safe way to prepare foods? May I please receive help? Repeat the conversion, using the relationship 1.00 m/s = 2.24 mi/h. Why is the answer slightly different? (Select all that apply.) The units are not the same. 2.24 mi/h is not a correct conversion factor to three significant figures. Using the conversion factor fails to keep extra digits until the final answer. A different conversion factor from minutes to seconds is used in each case. What is a single instruction that clears bits 0, 3, and 4 in the AL register?and al,11001110bor al,11100110bor al,00011001band al,11100110bor al,11110010band al,11100101b What else would you like students to know about Hispanic Heritage Month ?