1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
3 years ago
12

When a program needs to save data for later use, it writes data to a _____?

Computers and Technology
1 answer:
lara [203]3 years ago
4 0
It write data to a File
You might be interested in
your company decides to implement a RAID-5 array on several file servers. Which feature is provided by this deployment
Novay_Z [31]

Answer:

High availability

Explanation:

RAID-5 array is defined as a redundant array for independent disk configuration which makes use of the disk striping with the parity. It consists of a minimum three disk drives and it uses the data striping and the parity data to provide the redundancy.

RAID 5 is a powerful tool to ensure integrity of the data. It provides both performance as well as security to the data.

In the context, "high availability" is the feature that is provided by the deployment of RAID 5 array on the several file services.

4 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
A college asks you to write about a novel that is meaningful to you. What should you include in this essay?
Marina CMI [18]

The answer is C because they want you to compare it your or others lives.

4 0
3 years ago
Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.
zalisa [80]

Answer:

C) A company's website

Explanation:

8 0
2 years ago
A circuit is supplied with 30 VDC and contains three resistors connected in series. The value or R1 is 80 , the value of R2 is 1
sukhopar [10]
The answer is 5.68 Volts.

So givens are electric supply of 30 VDC and the values of 3 resistors. 

Given:
E= 30 VDC
R1 = 80 Ohms
R2 = 1000 Ohms
R3= 42000 Ohms

And what we are looking for is the voltage on the second resistor.
First we have to get the current of the circuit.

I = E/(R1+R2+R3)
I = 30 / (80+1000+4200)
I = 30 / (5280)
I = 0.00568 A

Then get the voltage V = I x R

V = 0.00568 x 1000
V = 5.68 V
4 0
3 years ago
Other questions:
  • An example of an unaltered material used to create objects is
    14·1 answer
  • Which two keys on the keyboard allow an access user to move the insertion point to the next field to the right in datasheet view
    11·1 answer
  • For this programming assignment, you have to write a Java program that tests whether a given input string represents a Valid E-m
    15·1 answer
  • Which trait depicts honesty?
    10·1 answer
  • By what decade were books readily available to the public across the United States and Europe? A. 1690 B. 1750 C. 1860 D. 1820
    9·1 answer
  • What are some of the causes for error 1921 when updating?
    11·2 answers
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • How do I answer a question that was answered incorrectly on Brainly
    10·2 answers
  • Visual basis,C, C++ and Java are all examples of computer programming ________.
    15·1 answer
  • Select statements about Multiprocessors that are FALSE. a. Asymmetric multiprocessors are a popular form of tightly coupled arch
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!