1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
4 years ago
5

after installing a secondary hard drive what needs to be done to the hard drive and what do these two task do?

Computers and Technology
1 answer:
elena55 [62]4 years ago
3 0
HEY heheh ehehhegeeh
You might be interested in
The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100
Elodia [21]

Answer: a) and c).

Explanation:

  • Ethernet is a Layer 2 and also Layer 1 Technology (this layer defines the technical details of cabling and connectors), so any upgrade to a newer, faster version (like 100G Ethernet) will be possible changing only the components operating at these layers, without changing anything in the higher layers like IP and TCP, for instance.
  • This is a direct consequence of the OSI layer model foundations, that say basically that each each layer is independent from the others, so the piece of software pertaining to one layer, only interacts with his layer peer in the destination machine.
  • So, any changes to the technology used in one of the layers, don't usually affect the operation of the other layers.
3 0
3 years ago
what optimizes airflow, keeps cylinder pressure in a certain range, and determines the engine's operating range?
emmainna [20.7K]
If you have choices, then I mut assume that these are following:
A. valve lift
B. push rod
C. intake manifold
D. valve timing. I think the answer is letter A.
6 0
4 years ago
______ view is generally used for creating, formatting and designing slide​
Sauron [17]
Normal view is generally used for formatting and designing slide
5 0
3 years ago
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
Which are factors that go into a project plan?
BaLLatris [955]

Answer:

The four critical factors to planning a successful project

Explanation:

5 0
3 years ago
Other questions:
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • Local variables:
    7·1 answer
  • What does Josh Silverman name as the most important aspect of managing finances?
    10·2 answers
  • Carol typed a memo to distribute to everyone in her department. To create this memo, she used a _____. spreadsheet word processo
    8·2 answers
  • Anyone got the edmentum computer programming post test answers?
    6·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following
    11·1 answer
  • Write the simulate method, which simulates the frog attempting to hop in a straight line to a goal from the frog's starting posi
    10·1 answer
  • Why is dark supereffective against ghost? (AGAIN)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!