1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
4 years ago
11

Peter has recently bought a media player and a digital camera he wants to buy a memory card and then use devices which memory do

I should pay to use in his digital camera and media player
A.hard disk
B. Flash drive
C. Compact disc
D. Digital video disc
Computers and Technology
2 answers:
Helen [10]4 years ago
7 0
Generally B, most modern consumer cameras use either CF (Compact Flash) or SD cards.
mel-nik [20]4 years ago
4 0

Answer

Flash drive

Explanation

A digital camera is used to take photos. Digital cameras use an image sensor instead of photographic film. Very often, they also use a memory card or a flash drive to store the photos in a digital format.Most modern digital cameras and media players use memory cards and flash drives memory for storage.

A flash drive is a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc.

You might be interested in
What is the name of the function used to open a file in C?
Rudiy27

Answer:

prompt box

Explanation:

the term has changed over the years.

4 0
3 years ago
How is abstraction used in a GPS system
ipn [44]
The designs on the map of the GPS system Im would think but can you be more specific?
8 0
4 years ago
Read 2 more answers
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Alexander studies sitting on the edge of his bed with his laptop on his lap. he complains of a sore neck. how can he best improv
kumpel [21]

The way in which Alexander can best improve his study area is that: D. he can put his computer on a desk and sit in a comfortable chair.

<h3>What is a laptop?</h3>

A laptop can be defined as a small, portable type of computer that is designed and developed by embedding both a mousepad and keyboard on it.

Also, it is usually light enough to be placed on an end user's lap while he or she is working.

In this scenario, the way in which Alexander can best improve his study area is that he can put his computer on a desk and sit in a comfortable chair.

Read more on a laptop here: brainly.com/question/26021194

#SPJ4

7 0
2 years ago
Which agency coordinates the internet's IP addressing and DNS systems?
german
ICANN is the agency which coordinates the internet's IP addressing and DNS systems.

ICANN stands for Internet Corporation for Assigned Names and Numbers. Aside from coordinating the Domain Name System (DNS) and Internet Protocol (IP) addresses, it also coordinates the technical protocol parameters of ARPA top level domain, Internet DNS root zone management (gTLD and ccTLD), allocates Internet number resources, and other services which will fulfill their vision of "one world, one Internet".

The performance of ICAANs services is all under a U.S Government contract.
4 0
3 years ago
Other questions:
  • What is a bus master?
    14·1 answer
  • Local television news networks cover only
    8·2 answers
  • Choose the false statement below. The content that displays in the browser is contained in the head section. The content that di
    14·1 answer
  • Presses the Schedulr app icon Selects the list item for CSCI 448 Presses the "View Classroom on Map" button While only performin
    11·1 answer
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • The design of a blog refers to:
    10·1 answer
  • By the 1990s, ______________ technology enabled one person operating a desktop computer to control most—or even all—of these fun
    8·2 answers
  • 3.19 LAB: Seasons In C++ Write a program that takes a date as input and outputs the date's season. The input is a string to repr
    15·1 answer
  • What is a best practice when approaching an automation effort?
    6·1 answer
  • Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an acti
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!