1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
8

Which statement regarding hard drives is incorrect?

Computers and Technology
2 answers:
il63 [147K]3 years ago
5 0

Answer:

Option (C) is the correct option to the following question.

Explanation:

Because SSD drives is costly as compared to the HDD drives which is depends on per GB(gigabytes) but Solid State Drive is more reliable and faster as compared to the Hard Disk Drive. HDD is also bigger than SDD and they slower then SDD in read and write.

So, that's why the following option is incorrect and all other option (except option C) is correct.

Veseljchak [2.6K]3 years ago
4 0

Answer: I think the answer is

c. solid state drives are less expensive than magnetic hard drives

Explanation:

You might be interested in
​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus
Lera25 [3.4K]
 <span>​ENIAC was the first commercially successful computer, released in 1946.
</span>The name ENIAC Electronic Numerical Integrator And Computer<span>).</span><span>
 It was </span>used to calculate artillery firing tables for the United States Army's Research Laboratory.
It was invented by J. Presper Eckert and John Mauchly at the University of Pennsylvania.
7 0
3 years ago
Write a program. Commence the change to be dispensed from a vending machine. An item machine can cost between $0.25 send a dolla
SSSSS [86.1K]

Answer:

Explanation:

The objective of this question is to write a java program for a vending machine.

/* This program finds out what amount the vending machine is going to dispense. A given item in the machine can cost between $0.25 and a dollar in five-cent increments (25, 30, 35, 40...90, 95 or 100), and the machine accepts only a dollar bill to pay for the item. */

// Compile: javac PP10. java

// Run: java PP10

// imported the scanner class from util package.

import java. util. Scanner;

//class declaration

public class PP10 {

// main method is defined here.

       public static void main(String[]   args)

          {

// declaration of the variables.

             Scanner keyboard=new Scanner (System.in):

//taking the string type input

              int nl, amount, n2, n3, n4, n5;

            System.out.println("Enter price of item (from 20

cents to a dollar, in 5-cents) :");

             n1=keyboard. nextInt ();

            System.out.println("You bought an item for "+n1+"

cents and gave me a dollar");

            System.out.println ("so your change is ");

//the amount is first calculated.

          amount=100-n1;

// quarter value is calculated

            n2=amount/25;

// rest amount is get here.

            amount=amount%25;

// dime value is calculated

             n3-amount/10;

// rest amount is calculated

            amount=amount%10;

// value of nickel is calculated here

            n4=amount/5;

// rest amount is calculated

            amount=amount%5;

//at last the number of pennies is get

            n5=amount;

// Display output

              System. out . println(n2+" quarters") :

              System. out . println(n3+" dimes") ;

              System. out . println(n4+" nickels") ;

              System. out . println(n5+" pennies") ;

       }

  }

Output:

Enter the price of the item (from 20 cents to a dollar, in 5 - cents):

So, you bought an item for $0.45 and gave me one dollar; thus, your change is

2 quarters

0 dimes

1 nickel

0 pennies

4 0
3 years ago
Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
Llana [10]

Answer:

D - a doctorate degree

Explanation:

You are studying in a role as a doctors position.

8 0
1 year ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
What coding scheme is used by most microcomputers?
Mrrafil [7]
The answer to your question is ISYS
3 0
3 years ago
Other questions:
  • List of functional programming languages
    6·1 answer
  • Davia draws a shape with 5 sides. two sides are each 5 inches long. two other sides are each 4 inches long. the perimeter of the
    15·1 answer
  • What does prominent hyperintensity mean relating to MRI?
    5·1 answer
  • What kind of game was pole position?
    6·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • The _____ of a local variable is the function in which the variable is created.
    6·1 answer
  • . Define the process of Technological relationship
    12·1 answer
  • What is computer assisted translation​
    9·1 answer
  • A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
    10·1 answer
  • Whats the best way to make a video game?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!