Which of the following can damage files to the point where the data they contain is no longer accessible?

A. power jacks
B. fires and floods
C. plugging a computer into a surge protector
D. an uncharged battery


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A function may return more than one item 2. function naming rules follow variable naming rules 3. Every include directive must be followed by using namespace std; 4. the types of parameters are optional in the function declaration 5. the parameter names are mandatory in the function header

Computer Science & Information Technology

A ____ is a list of discrete entities that are known to be benign.

A. blacklist B. hot list C. whitelist D. clean list

Computer Science & Information Technology

________ software protects you from marketing software that is installed on your computer

A) Spyware B) Adware C) Virus protection D) Gadget

Computer Science & Information Technology

What do the correlation calculations between age and number of visits tell Chloe? How can this data help her plan her daily operations?

What will be an ideal response?

Computer Science & Information Technology