1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
3 years ago
6

You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and

what do these 2 tasks do?
Computers and Technology
1 answer:
Levart [38]3 years ago
4 0
What needs to be done is hook it up to ur computer then wait for the driver to install and rhen ur done
You might be interested in
The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predica
baherus [9]

Answer:

1. Where,

2. From

Explanation:

In SQL query language when working on a database, a user can use certain clauses to carry out some functions.

Hence, The WHERE clause allows us to select only those rows in the result relation of the FROM clause that satisfy a specified predicate.

This is because the "Where clause" selects the rows on a particular condition. While the "From clause" gives the relation which involves the operation.

5 0
3 years ago
Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network
Fiesta28 [93]

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
7 0
3 years ago
The Sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on th
kvasek [131]

Answer:

it should be d

Explanation:

please mark this as brainlists i could really use it

6 0
3 years ago
Explain how chord works. To increasing the fault tolerance in chord, each node maintains a successor list (finger table) instead
andrew11 [14]

Answer:

Chord is a set of rules for a peer-to-peer distributed hash table it collects key-value sets by allotting keys to several computers (known as "nodes"); a node will collect the values for all the keys for which that is reliable. Chord defines how keys are allocated to the nodes, and how a node can determine the value for a distributed key by first locating the node liable for such key.

Explanation:

A chord is a peer-to-peer lookup service. It Resolves the difficulty of establishing a data item in a combination of shared nodes, considering various node arrivals and removals The most crucial operation in most peer-to-peer method is the efficient position of data objects.

It is able of supporting only one operation i.e. given a key, it maps the key on a link.

Algorithm:

Algorithm shows working of the chord:

// x is a node used to find successor of id

x.find_successor(id)

if (id (x; successor])

return successor;

else

// query is being delivered around the circle

entrance successor.find_successor(id);

6 0
3 years ago
Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.
snow_tiger [21]

Answer:

Digital level logic through machine level

Explanation:

Infrastructure as a Service can be regarded as computing cloud services that allows computation, storage, server in the cloud.it helps the user to access infrastructure in the cloud

Digital level logic which is in digital circuit that allows boolen expression, it allows signals as well as sequence to be expressed in form of numbers, it is usually view as been complicated but not.

It should be noted that Infrastructure as a Service (IaaS) replaces the Digital level logic through machine level of the computer hierarchy with an Internet-based infrastructure.

5 0
3 years ago
Other questions:
  • Decisions 1 and 3 are both ____________ decisions because ____________________.
    9·1 answer
  • Hidden costs of computers into our schools
    13·1 answer
  • Problems and Exercises 16 through 43 are based on the entire ("big" version) Pine Valley Furniture Company database. Note: Depen
    13·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • In what stage of an algae or fungi life cycle are they able to reproduce spores?
    10·1 answer
  • A qualifier distinguishes the set of objects at the far end of the association based on the qualifier value.
    5·1 answer
  • The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writi
    6·1 answer
  • Simplest way to start baking career is to attend_______.<br><br><br><br>​
    9·1 answer
  • your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
    14·1 answer
  • Send link for a qc or paddle
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!