1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
8

Mark each statement as true or false: a. PATA hard drives are older and slower than SATA hard drives. b. SATA1 is about 10 times

faster than SATA3. c. RAID 0 can be implemented using only a single hard drive. d. RAID 5 requires five hard drives working together at the same speed and capacity. e. You can use an internal SATA data cable with an eSATA port. f. A SATA internal data cable has seven pins.
Computers and Technology
1 answer:
deff fn [24]3 years ago
6 0

Answer:

The answer to this question can be described as follows:

a) True

b) False

c) False

d) False

e) False

f) True

Explanation:

In option a,  PATA device is used to connect the hard drives into systems.  Its title suggests, depends on parallel transmitting technology, contrasted to the compulsive-signaling tools.

In option b, SATA1 is a first-generation device, and SATA3 third generation, that's why it is wrong.

In option c and option d, both were wrong because RAID 0 and RAID 5 are Cloud computing software for storing data.

In option e, An internal SATA data cable with an eSATA port can not be used as an additional connection is provided by the eSATA port.

In option f, It is true because there are 7 pins in internal SATA.

You might be interested in
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
How does a hard drive work
svetlana [45]
A small hard drive typically has only one platter, but each side of it has a magnetic coating. Bigger drives have a series of platters stacked on a central spindle, with a small gap in between them. The platters rotate at up to 10,000 revolutions per minute so the read-write heads can access any part of them.
7 0
3 years ago
Q) Look at the code and determine the output
lutik1710 [3]

Answer:

B.

Explanation:

6 0
2 years ago
Mesh networks:__________.
postnew [5]

Answer:

b. typically contain more circuits in the network than in star or ring networks

Explanation:

In mesh architecture, all computers are connected to each other. In mesh all nodes connect directly and non hierarchical to each other so as  to efficiently route data.

Mesh combines the benefits of both ring and star networks. It  usually provide relatively short routes through the network (compared to ring networks) and provide  many possible routes through the network to prevent one circuit from becoming overloaded (as compared to star network).  Mesh network uses decentralized routing with each network performing its own routing.

Mesh network typically contain more circuits in the network than in star or ring networks and are more expensive than ring networks

7 0
3 years ago
Write code which takes a user input of a String and an integer. The code should print each letter of the String the number of ti
Alexus [3.1K]

import java.util.Scanner;

public class JavaApplication70 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Input a String:");

       String txt = scan.nextLine();

       System.out.println("Input an integer:");

       int num = scan.nextInt();

       String newTxt = "";

       int w = 0;

       for (int i = txt.length()-1; i >= 0; i--){

           char c = txt.charAt(i);

           while (w < num){

               newTxt += c;

               w++;

           }

           w = 0;

       }

       System.out.println(newTxt);

   }

   

}

I hope this helps!

7 0
3 years ago
Read 2 more answers
Other questions:
  • A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
    7·1 answer
  • The file extensions .webm, .m4v, and .ogv are used for:
    15·1 answer
  • Explain the function of the Ribbon in Microsoft Word.
    15·1 answer
  • Why should the data in a reservation system that is constantly being updated be stored on a magnetic disk instead of a CD or DVD
    15·1 answer
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • A(n) _____ access file is also known as a direct access file.
    13·1 answer
  • Yall like portal 1 or 2
    8·1 answer
  • A subroutine may be used to refer to which of the following? Check all that apply.
    15·2 answers
  • Explica el empleo de cuentas y contraseñas en archivos
    6·1 answer
  • Is there a way for me to play a .mp3 file from my computer using Atom?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!