1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
6

Name the three basic storage devices of a computer​

Computers and Technology
1 answer:
faltersainse [42]3 years ago
4 0

Answer:

Floppy diskette – A normal 3 ½ inch disk can store 1.44 MB of data.

Hard drive – An internal hard drive is the main storage device in a computer. ...

Magnetic strip – Magnetic tape drive stores video and audio using magnetic tape, like tape and video tape recorders.

Explanation:

You might be interested in
which of these tools stick to the edge of an image, thus making it easy to select the shape of an image
USPshnik [31]

Answer:

ljb lih lug outbpiyougvotvoy

outiyfiyfiyfiyffiyvitfurcutfcutcrcutfutcdu

Explanation:

didn't understand the question

3 0
3 years ago
Software that people commonly use in the workplace to make their lives easier is called
Lorico [155]
Software that people commonly use in the workplace to make their lives easier is called system software.
4 0
3 years ago
Examples of 15 viruses in computer
Zepler [3.9K]
Computer Viruses:

Morris Worm
Nimda
ILOVEYOU
SQL Slammer
Stuxnet
CryptoLocker
Conficker
Tinba
Welchia
Shlayer

Anti-viruses:

Esafe
Avast
Avira AntiVirus
e Trust Antivirus
Dr Web by
NOD32
F-Secure Antivirus
AVG Anti-virus
.Kaspersky Antivirus
McAfee Antivirus
eScan
PC-Cillin
Symantec Antivirus
8 0
2 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
______are our thoughts and feelings towards a particular subject
ddd [48]
c....attitudes.....
8 0
3 years ago
Other questions:
  • What is the one common feature that ties together different social media technologies? All of the social media tools we use toda
    5·2 answers
  • A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the el
    10·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Which of the following best describes a good role model?
    6·2 answers
  • ___ is an example of a function prototype.
    12·1 answer
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • WILL GIVE MORE POINTS, PLEASE HELP!!!
    11·1 answer
  • PLS HELP IM SO DESPERATE!! 40 points
    7·1 answer
  • How was kapilvastu named​
    11·1 answer
  • What is the difference between information poor and information rich<br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!