1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
6

What types of storage can be used to access your data on another computer?

Computers and Technology
2 answers:
aivan3 [116]3 years ago
8 0
You can use a hard drive, also called a USB/flash drive. Or, you can send it through email to your other computer and download it on that other computer/device.
krok68 [10]3 years ago
5 0

Cloud storage is a major option. There is also a USB stick (Memory Stick) and sometimes a hard drive. But, cloud storage is probably the best option because your info can be accessed from anywhere that had internet connections.

Hope this helps!

You might be interested in
Plato :
ddd [48]

Answer:

filler content

Explanation:

Isabel must use some sort of filler content while creating a wireframe that she is up with. For the banner, she can make use of the placeholder, and for the text, she can make use of the lorem ipsum. Also, if the wireframe is low fidelity then only she can use above. And if the wireframe is high fidelity then she should use the original banner and text.

3 0
3 years ago
Read 2 more answers
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
ololo11 [35]
<span>Net View is the command issue from a command prompt to see a listing of the computers in your workgroup.It will display the list of domains,computers resources which have been shared by the specified computer then it will list all computers currently in our domain.The syntax for net view using command prompt NET VIEW [\\computername [/CACHE] | [/ALL] | /DOMAIN[:domainname]].</span>
8 0
3 years ago
Fill in the blanks, so the print statement displays the result of the function call in order.
sergejj [24]

Answer:

Rep;ace the blank with

smaller, bigger

So, the complete line is:

smaller,bigger=order_numbers(100,99)

Explanation:

From the question, we understand that the program is to return the order of a number from least to highest

This has been well implemented in order_numbers function

Because the order function returns two values, the order_function must be called in order to accept two values and the syntax is:

<em>value1,value2 = function(return-value1,return-value2)</em>

In this case, the statement is:

smaller,bigger=order_numbers(100,99)

So, in the next line of the main, the values of smaller and bigger are printed:

<em>print(smaller,bigger)</em>

See attachment

Download txt
8 0
3 years ago
When would you use a composite primary key? Group of answer choices
vichka [17]

Answer:

A. Multi-field attributes

B. A ternary relationship

C. A unary relationship

6 0
2 years ago
Read 2 more answers
In the RGB color model, what do numbers 0-255 represent
Ludmilka [50]

In the RGB (Red, Green, Blue) color model, the numbers 0-255 represent  the intensities of each color beam .Each number represents an intensity value is on a scale of 0 to 255, It can be also written in hexadecimal form, from 00 to FF.

RGB values are encoded as 8-bit integers, which range from 0 to 255.

3 0
3 years ago
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • Two or more computers that are linked together are called which of the following
    10·1 answer
  • What standard linux utility is used to install and configure software on centos operating systems?
    8·1 answer
  • What is <br> central vision
    12·2 answers
  • When parking on hills or an unlevel surface, make sure your_____is
    15·2 answers
  • What is Human Dignity
    12·1 answer
  • Write 5 things that can be done to avoid computer vision syndrome
    8·2 answers
  • What tasks should a laptop accomplish?
    15·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!