1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
12

What components are in hard drives?

Computers and Technology
1 answer:
kiruha [24]3 years ago
6 0
A hard drive consists of hard disk assembly and front read/write control circuit. Hard disk drive assembly belongs to mechanical device and every component<span> of the assembly is composed of high precision machinery parts

I'm really sorry for asking, but please do you mind giving me a brainiest? I want to get a high rank.

Thanks!
</span>
You might be interested in
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Question Workspace Check My Work Copying computer software, video games, movies, or music without paying the producer for them i
Tcecarenko [31]

Answer:

Option B, CUSTOMER MISBEHAVIOR.

Explanation:

Consumer misbehavior can defined as the behavioral acts by consumers which violate the generally accepted norms of conduct in consumption situations, and disrupt the order expected in such situations. Misbehavior by consumers disrupts the openness, impersonal trust, and orderliness of the exchange environment.

Some of the examples of customer misbehavior are: shoplifting, bending rules, breaking rules by ignoring warnings and using products in forbidden or ways not recommended...

* Routinized response behaviour is a type of purchasing scenario whereby the purchaser of a product or a service has past experience with purchasing it and automatically makes the decision to purchase again.

* Psychological influences refers to the workings of the mind or psyche that influences customer decisions.

* Social influences refers to the intentional and unintentional efforts to change another person's beliefs, attitudes, or behavior.

Therefore, the option that best suits the question is option B, CUSTOMER MISBEHAVIOR.

3 0
4 years ago
6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements
Nat2105 [25]

Answer:

beinggreat78~here~to~help.

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

5 0
3 years ago
What protects original and creative expression of an idea?
alukav5142 [94]
A patent grants the right to sell an invention and claim it as your own
6 0
4 years ago
Read 2 more answers
What can web designers use to control the individual web page layouts for all of the pages on a website?
Lyrx [107]
You need to have a redirect link to each page on your homepage. So you have a better and simple navigation on your webpage. Every webpage should have a homepage, so that every person who visits, knows where to go back to.

4 0
4 years ago
Other questions:
  • Binary data is written in hexadecimal. For example, when creating a graphic for a website, colors are represented by six hexadec
    12·1 answer
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • Which of the following can you use to add a picture to your presentation?
    14·1 answer
  • I don't understand how to write code for this in Java using nested for loops only. The official question is: write a program tha
    8·1 answer
  • Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
    14·1 answer
  • Assume TCP is operating in steady state congestion avoidance phase (no slow start) and the maximum congestion window size is 220
    8·1 answer
  • Which workplace trend are outsourcing and telecommuting are examples of? Please select the best answer from the choices provided
    13·2 answers
  • Which of the following are parts of the Physical Layer?
    9·1 answer
  • DRU is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional o
    14·1 answer
  • 30 points Fill in the blanks,<br> Plz leave a explanation
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!