1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
12

Why ues storage unit?​

Computers and Technology
1 answer:
Jet001 [13]3 years ago
6 0

Huh? I don’t understand your question... please be more specific so we can help you

You might be interested in
A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
statuscvo [17]

Defining and assigning categories by the subject could be automated easily without incurring high costs or large amounts of time and effort.

One may create a straightforward algorithm to categorise the documents.Include every potential category in the algorithm.

Then, it would be simple to organise documents by subject, immediately backing up to a public cloud. Keeping corporate workloads on the public cloud involves duplicating resources.

As a fallback, using a service provider. selecting a backup solution that works between clouds (C2C). using online cloud backup services.

You should assess or evaluate these information sources once you have located information that satisfies the topic and criteria of your research. When you evaluate information, you are prompted to consider the authority, timeliness, point of view, and bias of various information sources.

Learn more about time and effort:

brainly.com/question/27670681

#SPJ4

6 0
2 years ago
Which network type uses a coaxial cable to receive its signal?.
Tresset [83]
If you’re asking what I think your saying I know comcast does
6 0
2 years ago
Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
asambeis [7]

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

7 0
3 years ago
A circuit has a resistance of 680 ohm and a current of 0.025 A. What is the voltage of the circuit
uysha [10]
V = IR

V = 680 * 0.025

Therefore

V = 17


If this is an exam-type question, don't forget to include your units too!

<span>Ω Ohms for Resistance
</span>V Volts for Voltage
A Amperes for Current

5 0
3 years ago
What term is commonly used to refer to HTML formatting?
yanalaym [24]

Answer: No particular term

Explanation:

If by formatting you are referring to the presentation of the html page or website means how the forntend looks then css is used. In case of text formatting then bold <b><b/> italic <i></i> small <small></small> superscript <sup></sup> subscript <sub></sub> etc tags available

6 0
4 years ago
Other questions:
  • How do rubrics increase learning?
    15·2 answers
  • Microsoft windows is the least used operating system true or false?
    15·2 answers
  • ______ engineers build prototype cars and troubleshoot them.
    8·2 answers
  • Como puedo poner fondo a mi teclado​
    9·1 answer
  • What Intel socket recommends the use of a liquid cooling system?
    12·1 answer
  • .Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular
    15·1 answer
  • The variables xp and yp have both been declared as pointers to integers, and have been assigned values. Write the code to exchan
    6·1 answer
  • Organizations must protect their sensitive information through digital security measures and their _____ through physical securi
    13·2 answers
  • Computer hardware refers to: Group of answer choices the mechanism through which users interact with a computer. handheld comput
    13·1 answer
  • Which would you use to get the number of elements in a dictionary?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!