1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
2 years ago
10

What do hard disk drive use to store data

Computers and Technology
1 answer:
Harlamova29_29 [7]2 years ago
8 0
A hard disk stores and retrieves data using magnetic storage
You might be interested in
The true or false questions.
tankabanditka [31]

Answer:

false

Explanation:

-exec option is not mandatory for the find command.

find will still list out the identified files even in the absence of -exec option.

For example:

find . -name test -print

will print out files with the name 'test' in the current directory. Note that there is no exec option in this example.

Same holds true for find with no additional options at all.

For example:

find .

will list out all files in the current directory.

3 0
3 years ago
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
A slide ____ is a special effect used to progress from one slide to the next slide in a slide show.
marusya05 [52]
Transition, transition are mainly used is videos, moves, and powerpoint, they use spatial effects and are smooth with different colors, paths, or sounds. 
8 0
3 years ago
Read 2 more answers
A program written in a(n) procedural language consists of sequences of statements that manipulate data items. __________________
Alenkasestr [34]

Answer:

true.

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is completely true. Procedural programming is a widely used paradigm that basically gives the program a set of routines or specifications, and the program mixes and matches them as they continuously repeat the process. It is used in many areas, including video game development.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
Which component of an email gives the recipient an idea of the email’s purpose and urgency?
Delvig [45]

Answer:

subject line

Explanation:

it is a brief description of what the email subject is.

4 0
3 years ago
Other questions:
  • When did internet came to existence?
    12·1 answer
  • Match the challenge with the term or process that offers a solution.
    6·1 answer
  • What was the ENIAC computer and how was it used/what for?
    9·1 answer
  • Which is a false statement considering copyright law?
    13·2 answers
  • Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network?
    11·1 answer
  • Generalized goals are more likely to be achieved than specific goals. True or False
    7·1 answer
  • Edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter
    13·1 answer
  • How do we explain the difference between fake news and facts​
    8·1 answer
  • I need help with this question.
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!