Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use a(n) ____ utility to do this.

Answers

Answer 1

Andrea tells Dean is that it is very important for him to save all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use an install utility to do this

What is a computer?

It should be noted that a computer simply means an electronic machine that can be used to make one's work easier.

In this case, Andrea tells Dean is that it is very important for him to save all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use an install utility to do this.

Learn more about computer on:

brainly.com/question/24540334

#SPJ12


Related Questions

C. What is windows operating system? Compare different versions of operating system after 2003

Answers

Answer:

:)

Explanation:

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows OS from 1985 to present day.

The Windows operating system (Windows OS) for desktop PCs is more formally called Microsoft Windows and is actually a family of operating systems for personal computers. Windows has traditionally dominated the personal computer world, running, by some estimates, more than 75 percent of all personal computers. Beginning in the early 2000s, Windows dominance has lessened with the growth of the Linux and Mac operating systems.

Windows provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. In addition to Windows operating systems for personal computers, Microsoft also offers operating systems for servers and mobile devices.

Windows is also the foundation for the Microsoft Office productivity suite. Introduced in 1990 as a Windows-only family of applications for desktop computers, Office has grown to become the world’s most widely used productivity suite, with windowscentral.com reporting an estimated 1.2 billion + user worldwide as of 2016.

In order to add controls to a form, you will use the form _______ which appears when you select the form. Group of answer choices Editor Developer Toolbox Designer

Answers

In order to add controls to a form, it must first select the form in the Form toolbox. Option C is correct.

What is toolbox?

A toolbox is defined as a window that comprises icons and buttons that represent program tools. The tools are meant to furnish a speedy approach to common operations.

A toolbox can float freely or be docked in the program's main window. To add controls to a form, it is important to first select the form in the Form toolbox.

Therefore, Option C is correct.

Learn more about the toolbox, refer to:

https://brainly.com/question/23421445

#SPJ1

Enterprise software includes a database and thousands of predefined​ ________________.

Answers

Answer:

Business processes. Hope it helps!

What type of relational methods that allow you to insert or update records and extract information from records for viewing? comptia

Answers

Data Manipulation Language (DML) allows a user to insert or update records and extract information from records for viewing.

What is a relational database?

A relational database is a type of database designed and developed to store, structure and recognize relation which exist between data points and items of information.

In database management system (DBMS), a type of relational methods which allows an end user to insert or update records and extract information from records for viewing is known as Data Manipulation Language (DML).

Read more on database here: brainly.com/question/13179611

#SPJ12

What is the primary motivation of the ""cyber warrior""?

Answers

The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Who is a  cyber-warrior?

This is known to be a person that is said to be involved in cyberwarfare, mostly for personal reasons or based on religious belief or others,

Note that The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Learn more about cyber warrior from

https://brainly.com/question/1460915

#SPJ12

which of the following is a mathematical function defined in the sql standard?

Answers

A  mathematical function defined in the SQL standard are:

ABSCEILING DEGREES, etc.

What are math functions in SQL?

Arithmetic functions such as ABS, CEILING, radians are known to be often found in SQL standard .

Note that SQL is said to be a query language set up for management of data that is been saved or held in a RDBMS.

A  mathematical function defined in the sql standard are:

ABSCEILING DEGREES, etc.

Learn more about SQL standard from

https://brainly.com/question/9692465

#SPJ11

You are given a string s, in which one letter occurs twice. every other letter occurs at most once. write a function which given a string s returns a single character string the letter that occurs twice

Answers

The program is an illustration of strings.

Strings are variables that are used to hold texts

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This gets the input

s = input()

#This iterates through the text

for i in range(ord('A'), ord('Z') + 1):

   #This converts each character to lower case

   ch rA = c hr(i) . lo wer()

   #This determines the character with two occurrences

   if s.count(chrA) == 2:

       #This prints the character

       print(chrA)

Read more about strings at:

https://brainly.com/question/15683939

#SPJ1

What are the two protocols used most often with iot devices? (select two. )

Answers

Z-Wave and Zigbee are the two protocols that are used most often with IOT devices.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established by professionals to obey a set of standard rules (conventions) such as Z-Wave and Zigbee.

In Computer networking, the two protocols that are used most often with Internet of Things (IOT) devices include the following:

Z-WaveZigbee

Read more on protocols here: https://brainly.com/question/17387945

#SPJ12

What do you understand by ' selecting' text​

Answers

Answer:

highlight the whole sentence

Explanation:

that is what it means

Selecting is highlighting text or picking an object.

what file extension is automatically added to documents in word 2019?

Answers

The file extension that is automatically added to documents in word 2019 is .docx.

What is a file extension?

File extension is the ending of a file that helps identify the type of file in operating systems, such as pdf files. For example the files extension of PDF is .pdf.

In a simpler terms, a file extension, or filename extension, is a suffix at the end of a computer file.

The file extension indicates the kind of file that is saved.

Therefore, the file extension that is automatically added to documents in word 2019 is .docx.

learn more on file extension here: https://brainly.com/question/14576685

#SPJ2

Select the correct answer.
An Al scientist placed an agent in a known environment. The agent observed changes in the environment. Soon, it began to take action
toward making a decision. What was the agent doing?
A. offline computation
B. online computation
OC. learning
OD. perceiving

Answers

According to the given condition, the agent doing the process of perceiving. Thus the correct answer is D.

What is perceiving?

Perceiving refers to the implementation of any concept based on learning, understanding, and observation of skills to make effective decisions.

In this situation, the agent has observed changes in the environment and based on his observation and analysis began to take action for decision making.

These perceiving nature helps to enhance the process of learning to seek improvement.

Therefore, option D reflects the perceiving nature of agent.

Learn more about skills, here:

https://brainly.com/question/9648460

#SPJ1

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

Network administrators use _____ technology when they need antivirus updates to be automatically downloaded on employees' workstations

Answers

Network administrators use push technology if they need antivirus updates to be downloaded on employees' workstations.

What is a network administrator do?

Network and computer systems administrators are known to be people who are responsible for the day-to-day running of the operation of a given networks.

Note that in the case above,  Network administrators use push technology if they need antivirus updates to be downloaded on employees' workstations.

See options below

a.

push

c.

virtual reality

b.

pull

d.

SaaS

Learn more about Network administrators from

https://brainly.com/question/5860806

SPJ12

In the certificate authority trust model known as a hierarchy, where does trust start?

Answers

In the certificate authority trust model known as a hierarchy, the trust start from Root CA.

What does a certificate authority do?

A certificate authority (CA) is known to be a kind of a trusted body that is known to often issues Secure Sockets Layer (SSL) certificates.

Note that In the certificate authority trust model known as a hierarchy, the trust start from Root CA as that is its beginning point.

Learn more about  certificate authority from

https://brainly.com/question/17011621

#SPJ12

Which code block is an example of a motion block in scratch?

Answers

Answer:

pretty sure it's when this sprite checked

Explanation:

Found on the inter net

A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software has caused another server in the cluster to become active. The system engineer has witnessed a:

Answers

In the case above, The system engineer has witnessed a Failover.

What is the use of Server cluster?

This is known to be a tool that makes a website to be able to run smoothly and it gives little glitches and a better user experience.

Therefore, In the case above, The system engineer has witnessed a Failover.

See full question below

A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software has caused another server in the cluster to become active. The system engineer has witnessed a:

a. Pairing

b. Failover

c. Load balance

d. Synchronization

Learn more about  cluster software from

https://brainly.com/question/2749543

#SPJ1

A process spawning or initiating another process is referred to as _____

Answers

In Computer technology, a process spawning or initiating another process is referred to as forking.

What is forking?

Forking can be defined as a process which involves taking the source code of an existing software project and using it to create (develop) an entirely new software program that is independent.

This ultimately implies that, forking is a process in computer technology that involves spawning or initiating another process.

Read more on forking here: https://brainly.com/question/18900609

#SPJ12

what is one of the key components of a typical formula?

Answers

The key components of a typical formula?

FunctionsReferencesOperatorsConstants.

What is a formula?

A formula is known to be made up of functions, references, operators, and constants as they help it to carryout its operations.

A function is known to be any rule, or expression that tells about an association between one variable and other.

Therefore, The key components of a typical formula?

FunctionsReferencesOperatorsConstants.

Learn more formula from

https://brainly.com/question/2005046

#SPJ11

Bios or uefi allow you to configure, enable, and disable the _____ that are bound to the motherboard

Answers

Answer:

devices

Explanation:

BIOS and UEFI are two computer firmware protocols that act as an interpreter between the operating system and the computer firmware. Both of these interfaces are used at computer launch to setup hardware components and launch the operating system stored on the hard drive.

BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.

What is BIOS in motherboard?

BIOS is known to be the (basic input/output system)  and it is a program of the computer's microprocessor that often helps to start the computer system after it is said to be powered on.

Note also that BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.

Learn more about BIOS from

https://brainly.com/question/13103092

#SPJ12

In a certificate authority (ca) infrastructure, why is a client certificate used?

Answers

Answer:

To authenticate the client with other computers, a client certificate is utilized. For component of the permissions before starting an encrypted channel, the client utilizes the CA certificate to validate the CA signature on the server certificate. Client software is often used. Web pages, for example, offer a list of trustworthy CA certificates, since  many users rely on their client software.

The client certificate that is used as part of the authorizations before launching a secure connection.

What is a client certificate?

A client certificate is a form of digital certificate that is used to make authenticated request to a remote server.

In this case, the client certificate is used as part of the authorizations before launching a secure connection.

Learn more about certificate on:

brainly.com/question/24931496

#SPJ12

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created. _________________________

Answers

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created: True.

What is a worksheet?

A worksheet is also known as a spreadsheet and it can be defined as a type of document which comprises cells that are arranged in a tabulated format (rows and columns).

In Computer technology, some of the common business practice include the following:

Creating a worksheet named Documentation with a description of the workbook.The name of the person who prepared the workbook.The date it was created.

Read more on worksheet here: https://brainly.com/question/4965119

#SPJ1

Q: Explain the basic units of primary storage and secondary storage.

Answers

Answer:

Primary memory usually refers to Random Access Memory (RAM), while secondary storage refers to devices such as hard disk drives, solid-state drives, removable “USB” drives, CDs, and DVDs.

What type of user can open any subscription level of quickbooks online using the quickbooks online advanced app?.

Answers

Answer:

A Custom user.

Explanation:

I believe this is right. Lol :')

What is being done to reduce the python population in florida?.

Answers

florida man eats the snake for breakfast

an ssl client has determined that the certificate authority (ca) issuing a server's certificate is on its list of trusted cas. what is the next step in verifying the server's identity?

Answers

The next step in verifying the server's identity is:

The CA's public key need to validate the CA's digital signature found on the server certificate.

What is SSL client?

Secure Sockets Layer (SSL) is known to be a kind of PKI protocol that helps to  authenticate a user's identity and it is one that often encrypt the communication that takes place between the client and the server.

Note that  in the above, the next step in verifying the server's identity is:

The CA's public key need to validate the CA's digital signature found on the server certificate.

Learn more about SSL client from

https://brainly.com/question/14425531

#SPJ11

[1] Define a computer system.

Answers

Hi There!

So, to help explain what a computer system or help gain an understanding, I am going to use a analogy. What I mean by that is how a computer system may be compared to a automobile.

An automobile is made up of a variety of pieces, including an engine, gearbox, axles, wheels, a battery, gears, and other electronics. The components are all interconnected within a frame and function as a whole to enable the car to travel down a road. There is also a driver. By interacting with or physically directing the steering wheel to do certain actions, such as driving straight ahead, turning left, or turning right, the driver controls the vehicle.

The computer system is like a car in that it merely consists of many pieces. The hardware consists of a CPU, memory cards, storage, and other electrical components. The hardware is arranged in a frame and interconnected so that the user may command the computer to do particular tasks. The user and the computer system must interface or communicate. The computer system features a keyboard and mouse instead of a steering wheel, which enables the user to interact with or direct the computer to do activities like opening a file, creating a document, or printing a page.

This comparison should help you understand what a computer system better.

Cheers!

ROR

in the active directory, what is the topmost level?

Answers

Note that in the active directory, the Forest is known to be the topmost level.

What is highest level in an Active Directory design?

An Active Directory forest is known to be the biggest level of organization that is found in the Active Directory as all of the forest often shares a single database.

Note therefore, that in the active directory, the Forest is known to be the topmost level.

Learn more about  active directory from

https://brainly.com/question/14364696

#SPJ11

As part of their extensive kitchen remodel, the Lees told their electrical contractors that they would need plenty of outlets for their many appliances. The contractors
knew that they would need to install small-appliance branch circuits using what kind of wire and circuit breaker?

Answers

The kind of wire and circuit breaker are:  grounding wire such as fairly large bare copper wire.

What is the best wire for the above?

A 20A, 120V small-appliance branch circuit is known to be  used in the case above.

Note that Electric range circuits needs about 50-amp, 240-volt made for circuit that is said to supplies the power to the range or oven via  a 6-3 electrical wire.

Learn more about circuit breaker from

https://brainly.com/question/8976395

#SPJ1

What are the advantages and disadvantages of E learning.​

Answers

Answer:

E LEARNING.This is the effective teaching and learning by using electronic media.

Advantages.Reduce travveling costs and time to and from school.Learner can study whenever they access computer and internet.Self paced learning models.Class works can be schedule around personal and professional work,resulting in flexibility learning.

Disadvantages.Student may feel isolated or miss social interractions.Un motivated learners or those with poor study habits may fall behind .Instruxtions may not be available on demand.

hope it helps.

Advantages.It preserve time to and from school.Learner can study whenever they access computer and internet.Self paced learning models.Class works can be schedule around personal and professional work,resulting in flexibility learning.

Disadvantages.Student can feel bored to learn alone.Un motivated learners or those with poor study habits may fall behind .Instruxtions may not be available on demand.Cost to ruin the service since it needs subscribtions for every periodof time to access more quality services.

state one device that may be found on a computer monitor that is used for video conferencing

Answers

Answer: Camera and Microphone

Explanation:

This can be  embedded on to the monitor.m

Camera for Visual

Microphone for radio.

Other Questions
acid base and solutions The inverse of the function f(x) = x + 10 is shown.==h(x) = 2x-0What is the missing value?0105O 10O 20 Samsara hinduism in your own words If xx = 10, what is the value of X? Find the value of x. Then find the measure of each labeled angle. What was thor doing when his hammer was stolen? who is known as the father of computer Jamal is a student in the health care professions class. He had a very exciting day at clinical and decided to post about it on his social media account. He posted the following Great day saving lives today! I did CPR and saved the patient!Jamal did not post his location or the patients personal health information; however, a friend of his (Dario) saw the post and realized that his neighbor was in a similar situation that day. Dario called his neighbors wife and inquired as to his health. During the conversation, Dario told the wife that his friend was there and performed the CPR. The wife reported Jamal to his program director.When considering Jamal's use of social media to talk about his day at clinical, which self was Jamal portraying? a. Public self b. Self esteem c. Ideal self d. Real self Subtract (0.95x minus -0.04) minus (0.99x minus 0.13). Each statement describes a transformation of the graph of f(x) = x. Which statement correctly describes the graph of function g if g(x) = f(x) 11? The logistical advantage the Spanish had in trade with China was their control over _______________. create a chart on the features of window 7 also paste some pictures of these features $80 gift marked up 60%give me the answer after the markup The students in Mr. McIntyres class and the students in Mrs. Ramoss class were asked how many pets they each have. The dot plots below show the results.Mr. McIntyres ClassA dot plot titled Mister McIntyre's Class. A number line going from 0 to 5 is labeled Number of Pets. There are 5 dots above 0, 5 above 1, 4 above 2, 1 above 3, and 0 above 4 and 5.Mrs. Ramoss ClassA dot plot titled Misses Ramos's Class. A number line going from 0 to 5 is labeled Number of Pets. There is 1 dot above 0, 2 above 1, 2 above 2, 4 above 3, 3 above 4, 3 above 5.Which statement correctly compares the means of the data in the dot plots? Solve the following...6x - 5 = -9x -9 Cycle City charges an initial price of $15 plus $0.75 per house for bike rentals, which is represented by the expression 15 + 0.75h . Complete the statement to describe the terms... When independent stock transfer agents are not employed and the corporation issues its own stock and maintains stock records, canceled stock certificates should Multiple Choice Not be defaced but be segregated from other stock certificates and retained in a canceled certificates file. Be destroyed to prevent fraudulent reissuance. Be defaced to prevent reissuance and attached to their corresponding stubs. Be defaced and sent to the secretary of state. what was the rationale for creating the merit system of selecting judges Question 4 of 40Which of these is a correct expansion of (3x-2)(2x2+5)?OA. 3x 2x2 + 3x 5+2 2x +2.5B. 3x 2x2 + 3x.5+ (-2) 2x2 + (-2).5O C. 3x 2x+(-2) 2x + 2x.5+ (-2).5SUBMIT If g:x = 2x-3 4 find 9^-1 (-3)