1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
5

How does a hard drive work?

Computers and Technology
1 answer:
BigorU [14]3 years ago
8 0

a hard drive is a metal disk constantly spinning  while powered on.

The data is written with a  metal scratching the data onto the wheel.

You might be interested in
Which key or keys do you press to indent a first-level item in a list so it becomes a second-level item
frozen [14]

This would be the Tab key

6 0
3 years ago
a boolean variable named rsvp an int variable named selection, where 1 represents "beef", 2 represents "chicken", 3 represents "
jekas [21]

Answer:

The code segment is written in Java.

  1.        boolean rsvp = true;
  2.        int selection;
  3.        String option1;
  4.        String option2;
  5.        if(rsvp == true){
  6.            System.out.println("attending");
  7.        }else{
  8.            System.out.println("not attending");
  9.        }

Explanation:

Declare all the variables as required by the question (Line 1 - 4).

Create a control structure using if-else statements so that when rsvp equal to true, the program will display "attending" else it will display "not attending".

 

8 0
4 years ago
Read 2 more answers
A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the messag
a_sh-v [17]

Answer:

Algorithm

Explanation:

Algorithm is a set of instructions designed to perform a specific task, an independent sequence of actions to be perform to solve a problem and instruction for performing a computation.

Algorithm is A(n) key set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes.

5 0
3 years ago
Read 2 more answers
Need help with my hw.​
jenyasd209 [6]
If I am correct, it should be D. Hopefully I was helpful.
6 0
3 years ago
Read 2 more answers
Which of the following rules is most likely to be used in an AUP?
sammy [17]
Communication should be civil and respectful of one another
3 0
3 years ago
Other questions:
  • On a spreadsheet, this is the term for a grouping of cells that touch each other and form a rectangle. An example of it would be
    13·1 answer
  • What is UTF-8 and why was it created?
    8·1 answer
  • Que son los sistemas de control con retroalimentacion
    10·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    11·1 answer
  • You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft, the browser doe
    15·1 answer
  • You decide to share the annual report for your company from your computer. You decide that the data will be stored in its own pa
    5·1 answer
  • How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
    15·1 answer
  • The first page of a website is what?​
    5·2 answers
  • What do I have to do to get you to cancel this subscription? I have emailed several times and every dang month I get a $10 charg
    10·1 answer
  • "The Future of Money" notes that the value of cryptocurrency "changes often and depends on demand." How could reading "The Value
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!