1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
13

How does a hard drive

Computers and Technology
1 answer:
stealth61 [152]3 years ago
8 0
Your answer is incomplpete<span>Native Americans have lived there for thousands of years, long before ... On July 4, 1776, people from the thirteen colonies created the United States ... In the early 1800s, the new nation faced many controversial issues, such as slavery ..... the United Stateswould not become involved in a war the two countries were fighting ...</span>‎Pre-Columbian America - ‎Colonial America - ‎<span>American Revolution</span>
You might be interested in
Gleick believes that the book is
ss7ja [257]

That it is a tool that does its job well, it's a technology that works.

6 0
3 years ago
select the correct answer from each drop-down menu. “To clean a computer screen, use ___. To clean a keyboard, use a ___.”
ivanzaharov [21]

Answer:

screen - soft cloth

keyboard - paintbrush

6 0
2 years ago
Use the drop-down menus to complete the statements about integrating pictures and text in a Word document.
FrozenT [24]

Answer:

1. Move with text

2. Fix position on page

3. Remove background

Explanation:

EDGE 2021

7 0
3 years ago
Read 2 more answers
One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without ____
Simora [160]

Answer:

One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without employing full-time IT professionals.

Explanation:

7 0
2 years ago
Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following
Lesechka [4]

Answer:

Yes Juan has done enough to secure the network

Explanation:

All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.

The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network

The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.

4 0
3 years ago
Other questions:
  • Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
    10·2 answers
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • What does the proofreading mark "..." mean?
    14·2 answers
  • The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the netw
    6·1 answer
  • With landscape photography, which depth of field do you normally want? A) Small B)Small to Medium C)Large D)With landscapes it d
    7·2 answers
  • What does this image represent?
    9·2 answers
  • Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
    5·1 answer
  • What type of things can be marketed
    11·1 answer
  • How do i work on code with someone else? i use visual studio code. me and a friend wanna make a game together with code. how do
    8·1 answer
  • A ______ is a portable device for recording audio and video.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!