1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
7

What is the recommended procedure for disconnecting an external hard drive to avoid losing data??

Computers and Technology
2 answers:
SpyIntel [72]3 years ago
6 0
Go to files than click on USB file then do eject device before taking it out
Nutka1998 [239]3 years ago
4 0
<h2>The correct answer is option <u><em>B.</em></u></h2>
You might be interested in
Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
storchak [24]

Answer:

35, 25, 50, 75, 95

Explanation:

List of five track numbers that will cause all three algorithms to visit the same tracks in the same order are -

35

25

50

75

95

Please go to attachment for the diagram how these 5 tracks will be traversed by various algorithms.

All the algorithms traverse in the order 35 -> 25 -> 50 -> 75 -> 95

7 0
4 years ago
Ryan is looking to buy a new HDTV set. He knows from friends that LCD set screens reflect less light than plasma set screens, bu
lbvjy [14]

Answer: Cognitive

Explanation:

 According to the question, the Ryan shows cognitive attitude towards the HDTV. The cognitive component basically refers to the three main components that are:

  • Thoughts
  • Beliefs
  • Attributes

The cognitive component is one of the type of attitude which basically consist of various types of thoughts, knowledge and the beliefs towards the any type of object. It is one of the belief and opinion of the attitude.  

3 0
3 years ago
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
Here is a super challenge for you if you feel up for it. (You will need to work this out in Excel.) In 2017 the Islamic month of
Ann [662]

Answer:

7/73

Explanation:

May has 31 days. 31 - 26 = 5. So there are 5 more days to the next month (June). June has 30 days. So Muslims fasted 35 days in total. 2017 had 365 days. 365 - 35 = 330 days were spent not fasting. So the fraction is 35/365. This fraction simplified would be 7/73.

4 0
4 years ago
What are the disadvantages of using pointers?
garik1379 [7]

Explanation:

The pointer is the variable that will store the address of the other variable of the same datatype.

Following are the disadvantages of using a pointer.

1. Pointer sometimes causes a segmentation fault in the program.

2. Sometimes pointer leads to a memory leak.

3. A pointer variable is slower than normal variable.

4. Sometimes the program is crash if we using pointer because sufficient memory is not allocated during runtime.

5. If we using pointer it is difficult to find the error in the program.

5 0
3 years ago
Other questions:
  • Please help! I have no idea how to make a chart like this in Google Sheets, any help is appreciated! :)
    15·1 answer
  • I need help answering these questions!
    11·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • How do u beat sonic unleashed
    8·1 answer
  • Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
    6·1 answer
  • How to draw use case diagram
    13·1 answer
  • 1.Anong uri ng application software ang iyong ginamit upang makapagtutuos ka ng datos?
    15·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • The largest group of Linux users is likely to be
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!