1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
12

Which is the most common drive letter where Windows stores most data and programs? A. B. C. E.

Computers and Technology
2 answers:
Bogdan [553]3 years ago
6 0
It's C I've done this test before
Effectus [21]3 years ago
4 0

The most common drive letter where Windows stores most data and programs is "C".<span>
<span>In the beginning the computers used to have two floppy drives which were named as A and B. Later when hard drives added up to the technology, it was written as "C" because A and B were floppy drives already :) </span></span>

You might be interested in
2. What is the name for an action performed by the VR Robot?
pychu [463]
Parameter is the answer you wanted
4 0
3 years ago
Read 2 more answers
How to represent derived attributes in database?
Vlad1618 [11]

Answer:

Derived attribute can be defined as a type of attribute where its value will be derived from one or more of the other attributes of the same entity set.

Explanation:

An example of derived attribute is when we have an entity set called General. The set then has attributes like [Form], [Characteristics], [Address}, (Employment No).

(Employment No) which is represented distinctly in the attribute set can be called a derived attribute if it can be derived from one or more of the other attributes.

Derived attribute can be gotten through calculating values and not storing values.

For example, let us consider the following record of Teachers records;

(‘Teacher Number’, ‘Name’, ’Date of Birth’, Age today)

(‘E105’, ‘Samson’, ’07-Dec-1990’, 0)

This record shows that the teacher Samson was born on 7th of December, 1990. At the time of record insertion, he was born and 0 years old. What will be the value of his age on ’07-Dec-2000’? It is about 10 years. It clearly shows that the value is not fixed and it is a variable whenever the DOB is adjusted.

Therefore, we are not creating our table with derived attributes in it. Instead, the values ofderived attributes can be calculated at the time of retrieval and shown to the user. Hence, the record will look like as follows;

(‘E105’, ‘Samson’, ’07-Dec-1990’)

This means that 0 is a derived attribute from the Date of birth.

7 0
3 years ago
A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
frutty [35]

Answer:

Well, I would definitely advise him to buy USB hubs.

Explanation:

USB hub is a device that can give additional USB slot for the user just by consuming one single slots. In recent years, USB hubs can contain more than 9 slots with different variety, including HDMI and DVI that is required by this particular friend.

Using this device will make it easier to plug in and plug out all the devices he wants to his laptop since it all connected to one single hub.

Since he only has the budget under 100$ , Dell DA300 6-in-1 USB-C Hub could be a good option for Him.

6 0
3 years ago
Select all statements that are true of cable internet connections.
tatyana61 [14]

Answer:

B.) They're broadband connections.

D.) They're shared bandwidth connections.

I hope this helps! ^-^

3 0
2 years ago
Which would be a responsible use of technology used by victims of cyberbullying?
IrinaVladis [17]

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
    6·1 answer
  • Because the data was formatted the same in two inventory files, you decided to combine their contents into one file. Now you wan
    7·1 answer
  • Your program will read a word (or a whole line) from the user. It will then count the number of vowels in the word (or line) and
    12·1 answer
  • True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards
    8·2 answers
  • Suppose that you have a multiplexer (mux) with 5 different inputs at the following bit-rates: (A) 20 Kbps, (B) 8 Kbps, (C) 12 Kb
    7·1 answer
  • What does a codec do? Choose all that apply.
    5·2 answers
  • Ports that are generally used to establish outbound connections are known as ___ ports.
    14·1 answer
  • N
    10·1 answer
  • Meryl works in the audio-video department
    10·2 answers
  • What does the asterisk (*) after select tell the database to do in this query?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!