1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
9

A _______ object is used for storing data.

Computers and Technology
2 answers:
Art [367]3 years ago
6 0

I think it would be a hard drive

TiliK225 [7]3 years ago
6 0
The answer is hard drive
You might be interested in
Which of the following is a valid HTML reference to a CSS file?
arsen [322]

Answer:

C

Explanation:

<link rel="stylesheet" type="text/css" href="syb/syb.css" title="stylesheet"/>

The above code is self explanatory. All others have wrong rel or title. Title is always stylesheet, and rel as well stylesheet as well as href is external css file which we are loading, and text/css is always the type as it is the css. None of the other has this syntax. And hence this is the right answer.

5 0
4 years ago
I am confused about joins in sql.
WITCHER [35]

Answer:

eeee3eeeeeeeeeeeeeeeeeeee

5 0
4 years ago
Read 2 more answers
What does the phrase at the drop of a hat mean?
umka2103 [35]

Answer:

When you use the expression 'At the Drop of a Hat' you mean that something is happening instantly, without any delay. Example of use: “We're all packed and ready to go; we can leave at the drop of a hat.”

Explanation:

Hope this helped!!  :)

Pls thank and maybe brainliest??

5 0
4 years ago
Read 2 more answers
Something the user knows (ID and password); something the user has (such as a smart card, which is a credit card device storing
Vlad1618 [11]

Answer:

Secure Authentication involves a combination of the following three information

Explanation:

Generally, it is important that users have access to secure sources of information or data. These data will be used by the users to get access to their platform such as account details. The user should also be the only person that has access to his or her vital information. This should not be disclosed to any other person.

8 0
4 years ago
PLS HELP ASAP- Select the correct text in the passage.
SCORPION-xisa [38]

Answer:

reread the text

Explanation:

I do it it helps

5 0
3 years ago
Read 2 more answers
Other questions:
  • Mark, David, Tia, and Ashley are team members in a computer programming class. They have been assigned the task of creating a co
    12·1 answer
  • Local television news networks cover only
    8·2 answers
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • What is the advantage of defining a target user?
    6·1 answer
  • If you have two redo log groups with four members each, what’s the optimal number of disks you need to provide appropriate prote
    5·1 answer
  • You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone betwe
    8·1 answer
  • A) Write 600 as the product of prime factors.<br> Give your answer in index form.
    7·2 answers
  • Your dad just gave you his old computer running Windows 7. You want to see how many volumes are contained within it. Which tool
    10·1 answer
  • What free website can you record videos on, and edit them without money?
    5·2 answers
  • The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letter
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!