1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
2 years ago
10

What do hard disk drive use to store data

Computers and Technology
1 answer:
Harlamova29_29 [7]2 years ago
8 0
A hard disk stores and retrieves data using magnetic storage
You might be interested in
2. Create a file with the follow integer/string content and save it as fun.txt. 6 fun. 3 hello 10 <> 2 25 4 wow! Write an
Nesterboy [21]

Answer:

see explaination

Explanation:

I made use of python program to solve this.

text file name with fun.txt.

6 fun. 3 hello 10 <> 2 25 4 wow!

Program code:

import re

file = open('fun.txt','r') #for reading file

strings="" #declaring empty string

for k in file:

strings=strings+k #all character in file is storing in strings variable for do operations

pattern = '\s' #for pattern \s is for space

result = re.split(pattern, strings) #split the string with space

for k in range(len(result)): #loop through the list of string

if(k%2) == 0: #checking for integer to time of string

p=int(result[k])

print(result[k+1] *p) #print times of the string(k+1)

Check attachment for output

8 0
3 years ago
the block cipher attack technique that attempts to retrieve the key by performing decryption and encryption simultaneously on a
tankabanditka [31]

The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

<h3>What is plaintext attack?</h3>

The known-plaintext attack is a type of cryptanalysis attack in which the attacker has access to both the encrypted and plaintext versions of the target data. These can be used to reveal additional hidden information, including code books and secret keys. An attack using known plaintext occurs when the attacker has access to pairs of known plaintexts and the ciphertexts that go with them.

The objective is to figure out the secret key (or keys) or to create an algorithm that would enable him to decrypt any additional messages. Ordinary readable text before it is converted into ciphertext in cryptography is known as plaintext, as is readable text that has been recovered from encryption. Not all data inputted into or outputted by encryption methods is plaintext.

Hence,  The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

To learn more about cryptanalysis attack refer to:

brainly.com/question/19202523

#SPJ4

3 0
1 year ago
When you assign a value to an int variable, you do not type any commas; you type only digits and an optional plus or minus sign
worty [1.4K]
Negative integer is the correct answer
7 0
4 years ago
What information on social networking sites could be used to discriminate against a potential employee
NISA [10]

the answer on plato is b

political affiliations

3 0
3 years ago
compare the use and style of business letters and electronic communicstion, such as e-mail or secure messaging within the emr.
RSB [31]

Answer:

Some of the differences that can be found in this communication means are: the time of reception and response, impression methods, presentation, resources invested, environmental impact.

Explanation:

In today's world it is possible to have endless possibilities in terms of the means of communication through which we can send a message effectively. In the past before the technological era that we are living at the moment, the most common form of communication was the business letters that were normally constituted in a very formal way since its writing, its impression, the way in which it was physically distributed its information, its envelope and the time of diffusion also had to be a little more extensive.

Now according to the technological advances and all the benefits that technology offers us, e-mail is the most efficient form of communication even for companies, who have been able to adapt satisfactorily the characteristics of the messages contained therein in order to achieve a formal communication in the same way and transmit the message in a much faster and more effective way, without having to spend on prints, luxurious envelopes and the sending of the physical document and can also leave a record of the sending of the information. In addition the e-mail can not only be used for formal communications but for any type of communication that is necessary, almost immediately and very effectively, with a low impact in the environment with less use of paper.

6 0
4 years ago
Other questions:
  • Question 1
    9·1 answer
  • In your own words, describe the advantages and disadvantages of the auto-negotiation protocol used in Ethernet communications.
    6·1 answer
  • [Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
    12·1 answer
  • ________type of website is an interactive website kept constantly updated and relevant to the needs of its customers using a dat
    5·1 answer
  • Identify and define the various systems used in creating the Technological Systems.
    15·1 answer
  • Consider the following code segment.
    11·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • It is an electronic device that capable of accessing accepting processing product and storing data​
    13·1 answer
  • How has the Internet expanded the reach of all of these types of media?
    5·1 answer
  • So in media literacy,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!