1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
2 years ago
10

What do hard disk drive use to store data

Computers and Technology
1 answer:
Harlamova29_29 [7]2 years ago
8 0
A hard disk stores and retrieves data using magnetic storage
You might be interested in
Which of these agents of education empowers the other..........
Tomtit [17]

Answer:

B. school

Explanation:

Because the school is where you learn and gain knowledge

4 0
2 years ago
Read 2 more answers
What happen if ignore the unsafe markings in hand tools in ict​
Snowcat [4.5K]

Answer:

Getting it right will not only protect employees and visitors from harm, it will also help to create a safe, productive workplace and mean that businesses can avoid any unnecessary financial loss.

4 0
2 years ago
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted?
IRINA_888 [86]

One possible reason could be low network bandwidth, where the maximum data throughout allowed by the network is insufficient to accommodate the large amount of data being streamed.

Let me know if you have any questions.

3 0
3 years ago
Which of these is an off-site metric for social media marketing?
Fudgin [204]
I will have to say c




3 0
3 years ago
Read 2 more answers
Other questions:
  • _____ are the supertiny on-off switches in a chip that work collectively to calculate or store things in memory. Transistors Mul
    10·1 answer
  • What is the biggest disadvantage of copying a worksheet into another workbook?
    13·1 answer
  • Clicking on the Spelling & Grammar button is one way to correct a spelling error in Word. Please select the best answer from
    7·2 answers
  • Does a BIOS reset erase data such as pictures, programs or other things like that?
    13·1 answer
  • A______ is a graphical representation of numeric data.
    8·1 answer
  • The incompatibilities in speed between the various devices and the CPU make I/O synchronization difficult, especially if there a
    6·1 answer
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • A customer comes into a grocery store and buys 8 items. Write a PYTHON program that prompts the user for the name of the item AN
    9·1 answer
  • If a touch screen chrome is not charging what is wrong with it
    13·2 answers
  • Why did the boy run from the pillow...... wrong answers only
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!