1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
4 years ago
5

What is the most common example of a magnetic storage medium in a personal computer

Computers and Technology
1 answer:
AnnyKZ [126]4 years ago
5 0

Answer: magnetic tape, floppy disks and hard-disk drives

Explanation:

You might be interested in
The process of using or controlling two or more windows at a time is known as. a threading .b multitasking. c hyperthreading.d s
mixas84 [53]
<span>The process of using or controlling two or more windows at a time is known as multitasking.</span>
5 0
4 years ago
Overview of your opinion of Digital Etiquette
Bas_tet [7]

Answer:

The basic idea behind the topic of digital etiquette is "treat others how you want to be treated." From an early age, students are taught this golden rule. Whether at home, at the movies, at a grocery store or in school, students learn that there are appropriate and inappropriate ways to behave and treat one another. With the overwhelming emerging technology and its involvement in our daily lives, it is fundamental that students transfer that understanding of appropriate behavior into the digital world.

4 0
3 years ago
Which type of image would require you to obtain permission from the author to use the image and possibly pay a royalty to the au
ASHA 777 [7]

Answer:

Copyrighted.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, a copyrighted image would require you to obtain permission from the author to use the image and possibly pay a royalty to the author for its use.

7 0
3 years ago
For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addres
Shkiper50 [21]

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

8 0
3 years ago
write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
natima [27]

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

7 0
3 years ago
Other questions:
  • Which are the different areas where IT needs to be developed? And How?
    12·1 answer
  • 100 in hexadecimal then. binary
    11·1 answer
  • Premise: Tracy has a file that contains a list of actors and the movies in which they acted. She wants to know the top 3 ranked
    8·1 answer
  • Can someone URGENTLY help me with my java code (I WILL GIVE BRAINLIEST)!? Ive been working on it for hours and its not working!
    12·1 answer
  • Kathy would like to export a report that she created into an easy-to-use file format that is supported on multiple
    5·1 answer
  • What, if anything, is returned by the method call rearrange ("apple")?
    8·1 answer
  • Rewrite the following program segment using a while loop instead of a for loop.
    11·1 answer
  • New friends??? if you want to be my new friend go follow my gram
    7·2 answers
  • May I ask, when you accidently drop your laptop into a pool,...(water) . Will the Data and Many other information... inside the
    5·2 answers
  • In Python, when do we use the str( ) function
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!