1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
2 years ago
14

Cable inside the computer transferring data between the mother board and storage devices.

Computers and Technology
1 answer:
Keith_Richards [23]2 years ago
3 0

A cable inside the computer transferring data between the mother board and storage devices is referred to as a storage device cable.

<h3>What is a hard drive?</h3>

A hard drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

In Computer technology, all hard drives are commonly installed on computers and other digital service for the storage of digital files and to enable the booting of a computer through its operating system (OS).

In conclusion, a cable inside the computer that is designed and developed to facilitate the transfer of data between the mother board and storage devices is referred to as a storage device cable such as Serial Advanced Technology Attachment (SATA).

Read more on hard drive here: brainly.com/question/26382243

#SPJ1

You might be interested in
In testing you find that one of the tables in your database has multiple versions of one of the columns, and updating the inform
emmainna [20.7K]

Answer:

C. i think

Explanation:

C. is my answer........

5 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Que es taylorismo plis
valina [46]

It is a method of work organization that seeks to increase productivity through the maximum division of functions, the specialization of work and the strict control of the time needed for each task.

7 0
3 years ago
What to do if India block your pc​
PIT_PIT [208]

Answer:

Download a VPN xD

8 0
3 years ago
Read 2 more answers
What is sent back after you sent FAFSA
MrRa [10]
FAFSA will send you back a SAR (Student Aid Report). They will send you an email giving you instructions on what to do what not to do. Which will be sent to you in a week. Then they will decide if the application is Approved or complete and rejected.
8 0
3 years ago
Other questions:
  • As a final lesson to her team, Katie shows them a job that has already been preflighted and is now getting ready to be sent to t
    7·1 answer
  • Following a company on likedin is most similar to
    8·1 answer
  • What type of firestopping technology expands as much as 25 times in volume?
    6·1 answer
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • True or False?
    8·1 answer
  • Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
    5·1 answer
  • The primary function of application software is to apply the power of the computer to enable people, workgroups, and the entire
    7·1 answer
  • What operating system do most users use?
    13·1 answer
  • As you are discussing marketing with a client, you try to explain how individuals find sites. Which tool will you explain as the
    8·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!