1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
5

How does a hard drive work?

Computers and Technology
1 answer:
BigorU [14]3 years ago
8 0

a hard drive is a metal disk constantly spinning  while powered on.

The data is written with a  metal scratching the data onto the wheel.

You might be interested in
Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
Alexxandr [17]

IMAP  protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server.

<h3>What is IMAP on one's email account?</h3>

IMAP is a term that connote Internet Message Access Protocol. IMAP helps one to be able to access the same inbox from a lot of devices.

Hence, IMAP  protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server.

Learn more about email server from

brainly.com/question/15710969

#SPJ1

5 0
2 years ago
Explain the term information security?​
Elodia [21]

Answer:

Information security is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerian hexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.

5 0
2 years ago
2. How can Tailwind Traders ensure applications use geo-redundancy to create highly available storage applications?
Nataly [62]

Tailwind Traders CAN ensure applications use geo-redundancy to create highly available storage applications by:

  • Running one's application in read-only mode.
  • Enforcing its use.

<h3>What is geo redundant storage?</h3>

Geo-redundant storage (GRS) is known to be a device that tends to copy one's data synchronously three times in the same or inside a single physical location in the primary region via the use of LRS.

Note that in the case above,  Tailwind Traders CAN ensure applications use geo-redundancy to create highly available storage applications by:

  • Running one's application in read-only mode.
  • Enforcing its use.

Learn more about Geo-redundant storage from

https://brainly.in/question/6073238

#SPJ1

6 0
1 year ago
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
Anvisha [2.4K]

Answer:

just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN

4 0
3 years ago
private members of a class are accessible only from _____________ of the same class or from their friends
maxonik [38]

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

8 0
3 years ago
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • 8) The higher the drag coefficient, the_____ the car will go<br> a)Siower<br> b)Faster
    9·2 answers
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • What percent of the internet is the deep web?
    14·1 answer
  • How does calculate() work?
    6·2 answers
  • What is the error in this?<br><br> userGuess = int(input(“Guess a number between 1 and 20: “))
    12·1 answer
  • Witch icon allows you to see paragraph formatting feature
    6·1 answer
  • Synapse is not working and is crashing every time you attach it. What should you do?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!