Nate needs to back up the data on his computer.

Once Nate chooses a backup method, he then needs to ______.

A. decide who can access the data
B. decide how many folders he needs to create
C. choose a password
D. choose a location for the backup


Answer: D

Computer Science & Information Technology

You might also like to view...

In most workplaces and many homes, computers are connected to form a local ________ to facilitate sharing of equipment and to improve security

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ is an example of an application category

A) Baking B) Lifestyle C) Gardening D) Collecting

Computer Science & Information Technology

Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?

A. Offensive Security Certified Professional B. Certified Ethical Hacker C. Certified Information Systems Security Professional D. CompTIA Security+

Computer Science & Information Technology