1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
4 years ago
7

Describe three types of physical storage currently used. what usage scenarios would be ideal for each?

Computers and Technology
1 answer:
Olin [163]4 years ago
4 0
3 types of physical storage could be : hard drives , cds &dvds and memory cards . the hard drive would idealy be used to store large files such as an os or many films , the disks (cd & dvds) would be used to either store music or other 'small data such as films or programs and a memory card is usually used to store photos and other digital media as they're commonly used in mobile devices<span />
You might be interested in
Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
Nonamiya [84]

Bluetooth on a laptop is often used to help pair a mobile device with another device for communication purposes.

  • Bluetooth

<u>Explanation:</u>

A Bluetooth gadget works by utilizing radio waves rather than wires or links to associate with your mobile phone, cell phone or PC. Bluetooth is a remote innovation standard utilized for trading information among fixed and cell phones over short separations utilizing short-wavelength UHF radio waves in the modern, logical and restorative radio groups, from 2.400 to 2.485 GHz, and building individual zone systems. For instance, on Windows, either right-click the Bluetooth symbol in the notice zone or go to the Control Panel to discover the Hardware and Sound > Devices and Printers page. At the point when the gadget shows up in the rundown of Bluetooth and different gadgets, select it to associate (pair) it to the workstation.

7 0
4 years ago
Which of the following is FALSE? Select one: a. The fast-paced and collaboration-based business environment makes email less use
12345 [234]

Answer:

The Atos case demonstrates that it is possible to cut out e-mail entirely.

Explanation:

6 0
3 years ago
How do you answer a question on here
Monica [59]
Didn’t you just make a question right now?
4 0
3 years ago
Read 2 more answers
What file type starts at offset 0 with a hexidecimal value of ffd8?​?
kiruha [24]
The answer is jpeg.  It is <span>file type that starts at offset 0 with a hexidecimal value of ffd8?.  JPEG stands for </span>Joint Photographic Experts Group.  It is a popular image file format,  commonly used by digital cameras to store photos<span>. The format also supports different levels of compression, which makes it ideal for web graphics.</span>
5 0
4 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Click _______ to add a new column to a table.
    6·2 answers
  • Without a(n) ____, a computer cannot function.
    8·2 answers
  • You arrive to an intersection with traffic
    12·1 answer
  • Where are the Add Level and Delete Level buttons located? Filter options list Sort &amp; Filter group Sort dialog box Custom fil
    11·1 answer
  • Some careers emerge to address the environmental impact human behaviors and processes might be having on our planet. True False
    9·2 answers
  • As a rising photographer who has recently been recognized for several impactful images, why might you explore copyright protecti
    13·1 answer
  • 5) [4 points] Suppose you have a simple computer that is capable of storing only the months of the year. The number of bits avai
    12·1 answer
  • Which of these is an example of open-source software?
    13·1 answer
  • Define a class named person that contains two instance variables of type string that stores the first name and last name of a pe
    14·1 answer
  • What are the advantages of hybrid computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!