answersLogoWhite

0

1. Erratic operation of a computer program (errors in software code, etc.)

2. User action (turning off the computer when the application are processing or writing/saving data, improper handling of information storing media, etc).

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

How do you fix a corrupted memory card for ps2?

I found a room with someone asking the same question and someone said to put a CD with songs into the system while it is off. Close the system and turn it on, then go to the memory space from browser and delet the corrupted data. I thought the man was stupid but I tried it. The this is I have 2 memory cards and on each memory card there is 2 corrupted datas. I was only able to delet one corrupted data from the memory card in slot one and none from the other card... So it does work and it's worth a shot as it clears at least one corrupt space. Good luck with the fancy stuff and Kudos to the man with the idea. :-D


Explain the difference between primary and secondary market research data give an example of each and explain how each helps define a business customer?

difference between primary and secondary market


What are the different stages of the data processing cycle explain briefly the function and relevence of each stage?

yes


Briefly explain the legal regulations in relation to data protection?

The regulations in data protection affects how data is used, accessed and protected. Each organization and company has to comply with the regulations to avoid the consequences of breaching the rules.


What are the various file-accessing techniques in data management system?

Explain the various file-accessing techniques in data management system. Also state the advantages and limitations of each technique


What does ecc mean?

ECC stands for "error correcting code". It is a way to check for accuracy by adding one bit of redundant data (or parity data) to the end of each byte. As an example, when the digits of a byte total an odd number, the parity bit will be a zero. When it is even, it will be a one. If the parity bits do not match their respective bytes, the data is known to be corrupted.


Explain how data is actually present in database?

Data in a database are stored in lines and columns. Each colum represents a question or a type of data that is usually an answer or a value. Generally, you can imagine datase data to be stored in a spreadsheet table but on a larger scale while all tables are interconnected.


What are the types of backup Explain each?

What are the types of backup Explain each?


What is the purpose of the checksum?

A checksum is an error-detection method in which each transmitted message results in a numerical value based on the value of the bytes in a message. The transmitter places the calculated value in the message and then sends the value with the message. The receiver applies the same formula to each received message and checks to make sure the accompanying numerical value is the same. If not, the receiver can assume that the message has been corrupted in transmission.


What does scarecrow do on Batman?

scarecrow injects batman with fear gas, which cause him 3 nightmares. You try to aviod his gaze. It gets harder each time.


State three forms of data transmission characteristic and explain each of them?

Parallel transmission is when multiple wires connect each sub-unit and data is exchanged simultaneously on separate lines. Serial transmission is when the bits of data are transmitted one after another. Asynchronous transmission is when only one character at a time or one byte at a time is sent.


What is the sources of variability in a stats graphs?

the whole question is that The data is not perfectly linear. Identify at least 2 sources of variability in this data AND explain the effect of each? Sources of variability = outlier???? so do I just need to indicate where the outliers are???