1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
9

Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his pres

entation with the class he is trying to connect a cable from his computer to the larger video output screen but Sanjay his hands are shaking so badly from nerves that he is having trouble plug in the cable until what part of his computer the port the disk drive the cabling the hard disk Drive

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
8 0
I think that would be the (HDD) Hard Disk Drive! Hope this helps!
You might be interested in
TO COMPUTING IN BUSINE
Diano4ka-milaya [45]

Answer:

<em>the</em><em> </em><em>correct</em><em> </em><em>answer</em><em> </em><em>is</em><em> </em><em>a.</em><em> </em><em>Word</em><em> </em><em>processing</em><em>.</em>

Explanation:

<em><u>hope</u></em><em><u> </u></em><em><u>this</u></em><em><u> </u></em><em><u>works</u></em><em><u> </u></em><em><u>out</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em>

5 0
4 years ago
Write the output of the following program:
Iteru [2.4K]

Answer:

Expression A

Explanation:

In this Pseudocode, the output would be 100. This is because the code is looping from 1 to 20 and adding together all of the odd numbers between 1 and 20. Since it is checking to make sure that the remainder of each number is not equal to 0 which would indicate an odd number, and if it is odd then it adds it to the variable S. Therefore, the odd numbers between 1 and 20 are the following...

1 + 3 + 5 + 7 + 9 + 11 + 13 + 15 + 17 + 19 = 100

6 0
3 years ago
PT8 what does the word " fossil " mean
Eduardwww [97]

Answer:

A fossil is any preserved remains, impression, or trace of any once-living thing from a past geological age. Examples include bones, shells, exoskeletons, stone imprints of animals or microbes, objects preserved in amber, hair, petrified wood, oil, coal, and DNA remnants

Explanation:

thanks

3 0
3 years ago
Read 2 more answers
What are some common security threats for our home devices and IoTs?
musickatia [10]

Answer:

  • Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.
  • A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.
  • Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

6 0
3 years ago
What is the relationship between an object and a class? A. An object is an instance of a class. B. A class is an instance of an
trapecia [35]

Answer:

A. An object is an instance of a class.

Explanation:

ʕ•ᴥ•ʔ

3 0
3 years ago
Other questions:
  • An empty frame used to reserve space for a picture to be inserted at a later time is know as what
    6·1 answer
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having i
    11·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • A __________ is when the sender cryptographically marks a message with its private key, which is achieved by a cryptographic alg
    12·1 answer
  • [c++] Write a recursive function takes a word string as input argument and reverse the word. Print out the results of recursive
    14·1 answer
  • What private service may occur on a web server?
    7·1 answer
  • When sending an email to work colleagues you should NOT use ____________.
    8·1 answer
  • Uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs
    14·1 answer
  • Difference between switch and switch lite
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!