1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
11

The ______is used to store data in tablets, smartphones, and digital cameras. The Secure Digital (SD) is the most common format

currently in use, available in various speeds and storage capacities. Select your answer, then click Done.
Computers and Technology
1 answer:
lana66690 [7]3 years ago
6 0

Answer:

Memory card

Explanation:

The Memory card is used to store data in tablets, smartphones, and digital cameras. The Secure Digital (SD) is the most common format currently in use, available in various speeds and storage capacities.

You might be interested in
A file named 'input.txt' contains a list of words. Write a program that reads the content of the file one word at a time. Check
Margarita [4]

Answer:

// here is code in java.

import java.io.*;

import java.util.Scanner;

class Main{  

    // function to check a word is palindrome or not

 private static boolean is_Palind(String str1)

 {

     // if length of String is 0 or 1

   if(str1.length() == 0 || str1.length() == 1)

   {

     return true;

   }

   else

   {

       // recursively check the word is palindrome or not

     if(str1.charAt(0) == str1.charAt(str1.length()-1))

     {

       return is_Palind(str1.substring(1,str1.length()-1));

     }

     

     else

     {

       return false;

     }

   }

 }

// driver function

 public static void main(String[] args)

 {// variable to store word

   String word;

   // BufferedWriter object

   BufferedWriter buff_w = null;

   // FileWriter object

   FileWriter file_w = null;

   // Scanner object

   Scanner sc = null;

   try

   {

       // read the input file name

     sc = new Scanner(new File("input.txt"));

     // output file

     file_w = new FileWriter("output.txt");

     // create a buffer in output file

     buff_w = new BufferedWriter(file_w);

     

     // read each word of input file

     while(sc.hasNext())

     {

       word = sc.next();

     // check word is palindrome or not

       if(is_Palind(word))

       {

           // if word is palindrome then write it in the output file

         buff_w.write(word);

         buff_w.write("\n");

       }

     }

     // close the buffer

     buff_w.close();

     // close the input file

     sc.close();

   }

   // if there is any file missing

   catch (FileNotFoundException e) {

     System.out.println("not able to read file:");

   }

   // catch other Exception

   catch (IOException e) {

     e.printStackTrace();

   }

 }

}

Explanation:

Create a scanner class object to read the word from "input.txt" file.Read a word  from input file and check if it is palindrome or not with the help of is_Palind() function.it will recursively check whether string is palindrome or not. If it is  palindrome then it will written in the output.txt file with the help of BufferedWriter  object. This will continue for all the word of input file.

Input.txt

hello world madam

level welcome

rotor redder

output.txt

madam

level

rotor

redder

3 0
3 years ago
What is the difference between ordered list and unordered list?
VladimirAG [237]

Answer:

In an ordered list, each item is displayed along with the numbers or letters instead of bullets

In an unordered list, each item is displayed with a bullet.

5 0
3 years ago
Which of the following devices is used in the first-generation computer​
scZoUnD [109]

Answer:

vacuum tube

Explanation:

Vacuum tube is used in the first generation.

4 0
3 years ago
A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.a. Trueb. False
Lady_Fox [76]

Answer:

The following statement is False.

Explanation:

The following statement is not true because the rootkit is an application that provides unauthorized access to the computer or any program and it is the software that is intended to harm the computer system. So, that's why the rootkit is not used to create a flood of the network traffic in the user's system.

6 0
3 years ago
Who wants to become friends
Korolek [52]

Answer:

Sure why not

Explanation:

7 0
3 years ago
Other questions:
  • Which type of energy conversion is an electric generator designed to perform?
    8·1 answer
  • You are trying to access the Wi-Fi network at a coffee shop. What protocol will this type of wireless networking most likely use
    11·1 answer
  • Compare the specialized and statistical functions in excel
    10·1 answer
  • Please write down a java program for below instruction.Min-Heap: Construct a Min_Heap from the following set of integers. Rememb
    5·1 answer
  • Write the name of the tab, command group, and icon that is used to create multilevel lists.
    12·1 answer
  • 1. What runs horizontally and is identified with numbers?
    12·2 answers
  • A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
    7·1 answer
  • Paige is writing about the progress her team made in setting up a new software system. in one detail, she tells that the team co
    12·2 answers
  • Qbasic program to check whether an entered number is positive or negative or neutral​
    15·1 answer
  • What was the most surprising thing you learned this term? Why did it surprise you? ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!