1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
9

Discuss the purpose purpose of of network attached storage devices

Computers and Technology
1 answer:
valentinak56 [21]3 years ago
5 0

Answer:

A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage. NAS devices often use a RAID configuration. An external hard disk is a separate freestanding hard disk that connects with a cable to a USB or FireWire port on the system unit or communicates wirelessly. External hard disks have storage capacities up to 4 TB and more. A removable hard disk can be inserted or removed from a built-in or external drive. Removable hard disks have storage capacities up to 1 TB. A disk controller consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components in a computer. A hard disk controller may be part of the hard disk on the motherboard, or it may be a separate adapter card inside the system unit.

Please Mark Brainliest If This Helped!

You might be interested in
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
timurjin [86]
My bad my friend was like that I don’t got it to go home I don’t want him texting him or whatever I don’t gotta is like I gotta do it
3 0
4 years ago
Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. Which of these options sho
marin [14]
If Darren wants to substitute every occurrence of the word bulky in his spreadsheet with the word strong, the one that he should use is the Find all function. This function simplifies the use of the Find method. Therefore, the correct answer would be option B. 
6 0
4 years ago
Why does a computer not understand physical variables (real world) read from sensors?
ohaa [14]

The reason why a computer does not understand physical variables read from sensors because they are only capable of having to handle and work on analogue and in order for them to understand, a digital converter is needed by the device in means of having to understand the given data.

5 0
3 years ago
What is computer generation.<br>name that generations ​
Brut [27]
Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Generation & Description
1 First Generation
The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation
The period of second generation: 1959-1965. Transistor based.

3 Third Generation
The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation
The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation
The period of fifth generation: 1980-onwards. ULSI microprocessor based.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Give an example of an if/else statment and a case statment that are equivalent. Your example should contain at least three choic
    5·1 answer
  • The ability to keep web page visitors at your site is called _______.
    11·1 answer
  • You want to average the numbers in the range b1:b30. you have named this range of cells data and wish to use this range name in
    9·1 answer
  • Question 14 (3 points)
    5·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • Critical thinking questions Giving 30 points if you answer correctly!!!!
    7·1 answer
  • Why is cyberbullying so devastating to many people beyond just the victim?
    8·1 answer
  • What does error code 18 indicate?
    11·1 answer
  • Which issue of computer ethics is concerned about the technological division in the society?​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!