1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
12

Why ues storage unit?​

Computers and Technology
1 answer:
Jet001 [13]3 years ago
6 0

Huh? I don’t understand your question... please be more specific so we can help you

You might be interested in
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Taya2010 [7]

Answer:

Attached is a screenshot of my code for 'PasswordGenerator' and the tests necessary.

Explanation:

If you need any explanation, please ask!

3 0
3 years ago
Read 2 more answers
Is(are) input value(s) to use with a program to test the accuracy of the output.
Law Incorporation [45]

Answer:

test cases

Explanation:

5 0
3 years ago
Read 2 more answers
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
3 years ago
Information Governance (IG) consists of? A. the overarching policies and processes to optimize and leverage information while ke
Tems11 [23]

Answer:  A) the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives

Explanation: Information governance(IG) is the act for the information to store , create, archive,deleting, valuing etc.This step is used for making the information secure and optimizable when required. IG gives the control over the information with respect to particular policy.

Other options are incorrect because frameworks used for extraction of  most of IT investments is known as IT(Information technology ) governance and method used for ensuring the data for forming database is known as data governance .Thus, the correct option is option(A).

4 0
3 years ago
See attached. I have code typed out but still having problems.
densk [106]

The constructor that takes four arguments: the title, the artist, and two arguments representing the song length in minutes and seconds is given below:

<h3>The Java Code</h3>

public class Song

{

   // instance variable declaration

  private String songTitle;

  private String songArtist;

  private Duration songLength;

// Constructors

  public Song (String title , String artist , int min , int sec )

  {

       this( title , artist , Duration.ofMinutes( min ).plusSeconds( sec ) ) ;

  }

  public Song (String title , String artist , int totalSeconds )

  {

      this( title , artist , Duration.ofSeconds( totalSeconds ) ) ;

  }

  public Song (String title , String artist , Duration duration )

  {

      this.songTitle = title;

      this.songArtist = artist;

      this.songLength = duration ;

  }

Read more about java programming here:

brainly.com/question/18554491

#SPJ1

5 0
1 year ago
Other questions:
  • What is a directory server?
    5·1 answer
  • NEED HELP NOW 25 POINTS!!!!!!
    15·2 answers
  • George, a user, has contacted you to complain that his issue has not been resolved. He has already contacted your department twi
    9·1 answer
  • Write an Enlistee class that keeps data attributes for the following pieces of information: • Enlistee name • Enlistee number Ne
    7·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • Data flow is not a major consideration when building an analytics model. T/F
    13·1 answer
  • A process at Host C receiving two incoming UDP segments from two different hosts will know that they originated from two differe
    14·2 answers
  • How many hours do you spend on the Internet per day?
    11·2 answers
  • Which of the following rules need to be followed when using variables?<br> Choose all that apply.
    9·2 answers
  • Which factor affects reading speed the most?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!