1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
6

External hard disks use different technology than internal hard disks. ture or false

Computers and Technology
1 answer:
bazaltina [42]3 years ago
8 0
False. They have a case and frequently a gizmo that takes their SATA (or whatever) cable and adapts it to USB (or whatever).
You might be interested in
What is the red wavy underline beneath the text
8_murik_8 [283]
It means that you spelled the word wrong, if you click on it you might be able to find the right way to spell it

7 0
3 years ago
Provide an example of making multiple paragraphs tags using html and at least 3 sentences.
DiKsa [7]

Answer:

<p> tag:

The <p> tag in HTML defines a paragraph. These have both opening and closing tag. So anything mentioned within <p> and </p> is treated as a paragraph. Most browsers read a line as a paragraph even if we don’t use the closing tag i.e, </p>, but this may raise unexpected results. So, it is both a good convention and we must use the closing tag.

Syntax:

<p> Content </p>  

Example:

<!DOCTYPE html>  

<html>  

<head>  

   <title>Paragraph</title>  

</head>  

<body>  

   <p>A Computer Science portal for geeks.</p>  

   <p>It contains well written, well thought articles.</p>  

</body>  

</html>

Output:

A computer Science Portal for geeks.

It contains well written, well thought articles.

6 0
3 years ago
The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which
NikAS [45]
Answer: b
Explanation:
5 0
3 years ago
Please Help Me!!! 40 Points!! Match the correct definition to each term
fgiga [73]

Answer:

is there anymore to this problem because I would like to help you out more mate.

6 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
Other questions:
  • Based on the relational model, create the database metadata as part the physical designphase.b)from the metadata, write the sql
    10·1 answer
  • Which of the following enabled mass production in the 1920s? a.standardization of spare parts b.mass availability of electricity
    7·2 answers
  • How do you plan to keep your personal and professional connections and activity seperate on various social media platforms?
    15·1 answer
  • The best-known communications protocol is probably smtp, which regulates internet data transport. _________________________
    6·1 answer
  • True or False
    13·1 answer
  • Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. det
    10·1 answer
  • Which part of the computer stores and processes data?
    14·1 answer
  • What is text formatting/
    5·1 answer
  • T.L.E
    6·1 answer
  • What will the following program display in the console?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!