1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
5

What is the most common example of a magnetic storage medium in a personal computer

Computers and Technology
1 answer:
AnnyKZ [126]3 years ago
5 0

Answer: magnetic tape, floppy disks and hard-disk drives

Explanation:

You might be interested in
What would be a suitable device to transfer 12 photos from one PC to another?
Arlecino [84]

Answer:

A memory stick.

Explanation:

A memory stick can be defined as a storage media device with flash memory. They are mainly used in smart or portable electronic devices such as mobile phones, digital cameras, mp3 players, camcorders, etc.

Memory sticks are usually small in size and as such are easily accessible for the transfer of digital files such as images, videos, audios from a portable device or computer to another device such as a computer.

Hence, a memory stick would be a suitable device to transfer 12 photos from one PC to another.

3 0
3 years ago
Andrew has invested in a new CAD system to use in his workshop. What changes have occurred because he adopted the new system?
Bad White [126]

Answer:

B.   CAD produces designs that are of the highest quality.

C.   CAD provides systems for error-free manufacturing.

Explanation:

B.   CAD produces designs that are of the highest quality.

CAD does produce the highest quality of design, way better than what traditional paper plans can do.

C.   CAD provides systems for error-free manufacturing.

Many manufacturing systems can read CAD designs directly before the need of a human intervention in between, that eliminates possible errors.

Answers A and D are not true, because once passed the learning-curve, CAD greatly accelerates the production of designs.  And we know the learning-curve is behind them because the question says he has adopted the new system.

5 0
2 years ago
Read 2 more answers
When a cells number format is “time” it will show a value in what format
Leokris [45]

The format of time shows a value of time day (what time it is).

When you choose the option of time you can have it displayed in a variety of formats, including military time and a time display that will change with regional time zones,

3 0
2 years ago
write a python function that takes the largest and smallest numbers in a list, and swap them (without using min() or max() )
Akimi4 [234]

Answer:

def SwapMinMax ( myList ):

   myList.sort()

   myList[0], myList[len(myList)-1] = myList[len(myList)-1], myList[0]

   return myList

   

Explanation:

By sorting the list, you ensure the smallest element will be in the initial position in the list and the largest element will be in the final position of the list.

Using the len method on the list, we can get the length of the list, and we need to subtract 1 to get the maximum element index of the list.  Then we simply swap index 0 and the maximum index of the list.

Finally, we return the new sorted list that has swapped the positions of the lowest and highest element values.

Cheers.

8 0
2 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
Other questions:
  • Predictive coding software leverages .............................when experts review a subset of documents to teach the softwar
    15·1 answer
  • What is key to remember when handling linked lists?
    12·1 answer
  • What is a computer dedicated to a single function, such as a calculator or computer game? A. TabletB. PDAC.ApplianceD. Minicompu
    6·1 answer
  • a) Write out an abstract class to represent a ball. Include data fields to store the weight of the ball as a double value and th
    6·2 answers
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • If i keep giving out brainlyest will i get banned again?
    12·2 answers
  • Características que debe tener un módulo o kit tecnológico para aprender​
    14·1 answer
  • Match the vocabulary to the appropriate definition.
    13·1 answer
  • Put simply, what tasks do algorithms help computers perform?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!