1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
3 years ago
8

How a hard drive works

Computers and Technology
1 answer:
Leno4ka [110]3 years ago
7 0
A hard drive is basically a memory addon.
You might be interested in
The process of analyzing data to extract information not offered by the raw data alone; it uncovers trends and patterns using te
anygoal [31]

Answer:

The correct answer to the following question is "Data Mining".

Explanation:

It is indeed a method that businesses that are used to transform the raw information towards valuable data. Corporations might learn something about their clients instead of using technology to analyze trends in large quantities of content to create more efficient campaigns, boost revenue as well as reduce costs.

  • It encompasses investigating as well as analyzing huge blocks of documentation to extrapolate useful behavioral patterns.
  • It constructs discernment about what actually happens in certain details, and is already teensy bit mathematical than scripting, but utilizes both.
5 0
3 years ago
Windows displays a(n)
pochemuha

Answer:

system I hope tis is right

7 0
3 years ago
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
Yuki888 [10]

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

4 0
2 years ago
Which type of page of replacement algorithm is Windows XP and Unix are using?
mel-nik [20]

Answer:

Windows XP uses the Local Page Replacement algorithm. It is a type of FIFO. In this, Pages are taken from processes using more than their minimum working set and Processes initialize with a default of 50 pages. XP monitors page fault rate and adjusts working set size accordingly.

UNIX uses the Global replacement Algorithm through Modified second-chance clock algorithm.  Here Pages are aged with each second and Pages that are not used for a long time will eventually have a value of zero.

7 0
4 years ago
Pleaseeee Help.
Elenna [48]

Answer:B

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • âthe first line in a hypertext markup language (html) file is the _____, which is a processing instruction indicating the markup
    9·2 answers
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    7·2 answers
  • A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are i
    6·1 answer
  • What is the biggest type of gear?<br><br>A. Spur<br>B.Worm<br>C.Wheel<br>D.Pinion
    6·2 answers
  • ITS MAKING ME TYPE URL CODES NOW!
    6·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • How can I unblock Brainly?
    12·2 answers
  • Anyone know how to do Calculator program in python ?
    14·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
  • 2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!