1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
4 years ago
9

While a hard drive is running, even a slight bump against the computer may cause the

Computers and Technology
2 answers:
Sphinxa [80]4 years ago
6 0

The answer is C. The Computer will lose data. Because you don't want to damage the USB.

saul85 [17]4 years ago
4 0

c because it wil stop it from whatever its doing

You might be interested in
Declare a Scanner reference variable fileInput, and assign it a newly created Scanner object that is associated with a file name
Naily [24]

Answer:

Scanner fileInput = new Scanner(new File("data1"));

Explanation:

In JAVA Scanner class is used to get input from the user.

In order to use this class an instance of this class is created also called an object.

Here the fileInput is a reference variable which is also called instance variable used to access a Scanner object.

new keyword is used here to create an instance or object of Scanner class.

File is a class which works with files and directories. So new File("data1") is used to create an object of File and data1 is passed to it because in order to create an instance of the class, a string, which can be a name of file or an object is passed.

4 0
3 years ago
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
How do I send the face to the back? Seriously, I can't find out how...
makvit [3.9K]

Answer:

i think you can layer it :)

Explanation:

nice drawing btw!

8 0
3 years ago
Write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print
elena55 [62]

Answer:

The program to this question as follows:

Program:

#include <iostream> //defining header file

using namespace std;

int main() //defining main method

{

int n; //defining integer variables

cout<<"Enter number: "; //message

cin>>n; //input value by user

while (n< 100) //loop for check condition

{

cout<<n<<" ";//print value

n=n*2; //calculate value

}

return 0;

}

Output:

Enter number: 8

8 16 32 64  

Explanation:

In the above C++ language code, a header file is included, then defining the main method, inside the method an integer variable n is defined, which is used for user input for calculating their double number.  

In the next step, The while loop is declared, and the loop variable n range is defined, that its value is less than 100, inside the loop the variable n is used to calculate, its double number, and print function "cout" to print its value.

4 0
3 years ago
10 points
Bingel [31]

Answer:

cool this is cool

Explanation:reEEEEEEE

6 0
3 years ago
Other questions:
  • Write a function that, given an array of integers and its size, reverses the elements in the array. For example, if the original
    13·1 answer
  • What is the most effective way to demonstrate being prepared for an interview?
    8·2 answers
  • There are several different formats for storing images. They are prints, slides, negatives, and digital. Which is the best forma
    8·1 answer
  • Regarding computer protection, quarantining is defined as ________.
    9·1 answer
  • What frequency band or bands do 802.11g, 802.11a, 802.11n, and 802.11ac use?
    13·1 answer
  • Draw a flowchart diagram for a program that display a person's name x times​
    5·1 answer
  • Jobs with only 7 letters
    7·2 answers
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
  • OoooA,SDHVAcgacxgjcaNASAW dysdyxsgcdsgjsdgc
    8·2 answers
  • While some audio recording programs are expensive, there are more user friendly,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!