ICT
ARCHITECTURE OF 8085
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
periodically defrag it
|
|
regular backups
|
|
run chkdsk at least once a week
|
|
run scandisk at least once a week
|
|
run a regular diagnostic
|
Detailed explanation-1: -regular backups. periodically defrag it. run check disk at least once a week. run scandisk at least once a week. run a regular diagnostic. 20-Sept-2019
Detailed explanation-2: -Encrypted hard drive architecture The Data Encryption Key is the key used to encrypt all of the data on the drive.
Detailed explanation-3: -Use the highest level of encryption possible. AES 256-bit encryption is more secure than AES 128-bit. Evaluate encryption software carefully. Use software from a well-known source (for example, Windows’ BitLocker). Back up the encryption key or password. 21-Sept-2022
Detailed explanation-4: -Use an External Hard Drive. There are two types of external drives you can buy: HDDs (hard disk drives) or SSDs (solid-state drives). Use a USB Flash Drive. Use Optical Media. Use Cloud Storage. Use an Online Backup Service. Invest in a Network Attached Storage (NAS) Device. 13-Dec-2022