1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
2 years ago
10

Which term does not refer to a variant of the full-size secure digital (sd) memory card?

Computers and Technology
1 answer:
dsp732 years ago
4 0

Micro SD term does not refer to a variant of the full-size secure digital (sd) memory card.

<h3>What is Secure Digital a memory card?</h3>

A Secure Digital (SD) card is a tiny flash memory card developed for high-capacity memory and different portable devices, such as car navigation systems, cellular phones, e-books, PDAs, smartphones, digital cameras, music players, digital video camcorders, and individual computers.

<h3>What is the best device for storing digital photos?</h3>

Hard drives are good for storing photos because they are cheap, they provide fast admission to data, and it's very easy to copy a whole hard drive to another hard drive  especially if you have USB 3.0 or Thunderbolt associations

To learn more about Micro SD, refer

brainly.com/question/24723558

#SPJ4

You might be interested in
Suppose you want to sell your product to of one of the school canteen of El Salvador city thus you conducted study to one of the
Lyrx [107]

The interpretation of the table is that it shows that 45.12 percent of the respondents are in 16 years of age when likened to 12.20 percent who are 19 years old and 18.29 percent that are in 18 years of age.

<h3>What is the table about?</h3>

The table is one that shows the age profile for Filipino children from 0 to 4 years and above to 19 years,

Note that it is also made up of the largest age group making up from 10.1 to 10.7 percent as seen on the Philippine Statistics Authority (PSA).

Therefore, students that are in 16 years of age will have the ability to take in or consume products more than the older students as seen in El Salvador City.

Learn more about product  from

brainly.com/question/10873737

#SPJ1

4 0
2 years ago
Which rule should be followed to stay safe online?
anyanavicka [17]

Answer:

Avoid sharing photos with anyone online.

Explanation:

People can track you down. Its not worth to be kidnapped. Stay safe.

4 0
2 years ago
Calcule o resultado em cada caso atividade de matemática poder me ajudar<br><br>​
Phoenix [80]

Answer:

I do not understand can you type in English?

Explanation:

7 0
3 years ago
Describe the two alternative for specifying structural constraints on relationships types?
AysviL [449]

Answer:

They are the cardinality ratio and participation constraints.

Explanation:

The Cardinality Ratio: This is for the binary relationship that specifies the max number of instances of relationships in which an entry can take part in. As an example, the Student Of binary relationship form, School: Student, the cardinality ratio of this is 1: N. and that means each of the schools can be mapped to any number of students, however, one student can be mapped to only one school. And various possible cardinality ratios for various types of binary relationships can be 1: N, N:1, 1:1, and M: N.

Participation constraint: This stipulates that an entity being be contingent upon another entity through relationship form. And it stipulates the least figure of instances of relationship which each of the entity can indulge in, and is often termed as least cardinality constraint. And we have participation types: partial and total.

4 0
2 years ago
What is the difference between Sleep and Shut Down?
OleMash [197]

Answer:

When you shut down your PC, all your open programs close and the PC shuts down your operating system. but In sleep mode, the PC enters a low-power state. The PC's state is kept in memory, but other parts of the PC are shut down and won't use any power.

Explanation:

3 0
2 years ago
Other questions:
  • Which one of these is the most commonly used hardware interface for attaching peripherals to a microcomputer?
    8·1 answer
  • In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
    15·1 answer
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • To support continuous improvement efforts in the workplace, you increase the number of tasks that an employee performs and have
    7·1 answer
  • Make a program that prints each line of its input that mentions fred. (It shouldn’t do anything for other lines of input.) Does
    10·1 answer
  • A file that is 242 megabytes is being downloaded. if the download is 15.4% complete, how many megabytes have been downloaded? ro
    5·1 answer
  • With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
    15·1 answer
  • List five application programs you recommend, and write a sentence explaining why.
    9·1 answer
  • What are the columns in a Microsoft Access table called?
    15·1 answer
  • Write a program to display MPH (Miles per Hour). Create a function to calculate the MPH. Ask the user for the number of miles dr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!