1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
10

A diskette is divided into concentric circles known as______.

Computers and Technology
1 answer:
Mademuasel [1]3 years ago
4 0

Answer:

Tracks

Explanation:

A disk is divided into thin concentric circles called tracks. The heads move between the outermost track or zero track to the innermost track.

It is the circular path drawn through the circular surface of the disk plate by the read / write head.

Each track consists of one or more Cluster.

You might be interested in
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Which of the following is used to manage the objects in a database?
kirill [66]

The answer is the B: The Navigation Pane

All the objects in a Microsoft Access database are listed in the Navigation Pane. You can view and manage the categories and groups of objects in the Navigation Pane. You can also hide groups, objects, or the entire Navigation Pane. In addition, you can also use the Navigation pane to sort objects, find objects in a database, and add objects to a custom group.  By default, the navigation pane appears when you open a database in Access.


8 0
3 years ago
I am trying to go into my outlooks, email but it says. :-( Something went wrong You're currently signed in as ||my hotmail|| . P
Ksju [112]

Answer:

ok???

Explanation:

4 0
2 years ago
Why does my school crhomebook not letting me sign In
Stella [2.4K]
Wrong sign in information that your putting in maybe?? If it’s not even giving you an option you need to ask your teachers next time your in school
3 0
2 years ago
Read 2 more answers
How do you take a picture on an apple computers
Mamont248 [21]

Answer:

You go to the launcher, then find Photo Booth. Photo Booth allows you to take photos. You can only take photos on the side where the screen is, since there isn't a camera on the back. I recommend taking a picture with a phone instead. For a screenshot, press command-shift-3.

Hope this helps!

3 0
2 years ago
Other questions:
  • What tips or techniques should you keep in mind when shooting photographs on a rainy day?
    6·1 answer
  • IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Ne
    10·1 answer
  • Computer a sends a packet intended to reach computer f. along its path it arrives at computer
    15·1 answer
  • To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated b
    11·2 answers
  • EDVAC stands for? on which theory it is made on?
    15·1 answer
  • Because people can easily upload information and share online, they tend to:
    15·1 answer
  • What is the next line? >>> tupleB = (5, 7, 5, 10, 2, 7) >>> tupleB.count(7) 1 0 5 2
    9·1 answer
  • What does XML do with a data wrapped in the tags?
    7·1 answer
  • Which task can be completed with the Template Organizer?
    12·2 answers
  • Which statement best describes the computers all around us?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!