1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
10

What is the difference between hard disk and tape disk.​

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
4 0

Answer:

A hard disk is a type of electro mechanical storage device that is used to store and retrieve digital information at a high speed while the tape disk is a storage device that stores data on a magnetic tape.

Explanation:

Due to its technology, the hard disk can accommodate high amounts of data and is faster than the tape disk.

You might be interested in
The soft-tissue lining of oysters and clams creates pearls. Is a pearl a mineral?
Kisachek [45]
<span>A pearl is not a mineral because it is created artificially. It is a gemstone, not a mineral because it is a composite of mineral Aragonite and a protein compound which is called conchiolin. Pearls are formed by organic and living organisms which is preserved to become a gemstone.</span>
3 0
3 years ago
Read 2 more answers
4. Write a program to calculate square root and<br>cube root of an entered number .​
nataly862011 [7]

Answer:

DECLARE SUB SQUARE (N)

CLS

INPUT “ENTER ANY NUMBER”; N

CALL SQUARE(N)

END

SUB SQUARE (N)

S = N ^ 2

PRINT “SQUARE OF NUMBER “; S

END SUB

3 0
3 years ago
Which statement is used to assign value to a variable?
Romashka [77]

Answer:

the "=" sign is used to assign value to a variable. Example:


int number = 25;

You are basically assigning the value '25' to a variable of type 'integer' called 'number'.

Explanation:

3 0
2 years ago
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat
LUCKY_DIMON [66]

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

8 0
2 years ago
Question # 2
CaHeK987 [17]

Answer:

ZeroDivisionError

ValuError

Explanation: Edg 2020-2021

6 0
2 years ago
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • Which type of movement lets the player control an object's movement?
    5·1 answer
  • Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes
    5·1 answer
  • A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
    15·1 answer
  • In your own words, describe the advantages and disadvantages of the auto-negotiation protocol used in Ethernet communications.
    6·1 answer
  • Which statements accurately describe tropical rain forests
    7·1 answer
  • Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    15·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • In which situation is coauthoring of presentations primarily utilized?
    9·1 answer
  • which of the following can be represented by a sequence of bits. 1. An integer 2. An alphanumeric character 3. A machine languag
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!