1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
4 years ago
6

You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and

what do these 2 tasks do?
Computers and Technology
1 answer:
Levart [38]4 years ago
4 0
What needs to be done is hook it up to ur computer then wait for the driver to install and rhen ur done
You might be interested in
Jamie is writing an investigative report with footnotes
xxTIMURxx [149]

Answer:

????

Explanation:

does she need help with the footnotes?

7 0
4 years ago
Read 2 more answers
A _______ contains several blades of differing thicknesses and is used to measure the clearance between parts.
motikmotik
A Feeler Gauge. It is a tool used to measure gap widths
3 0
3 years ago
2. Imagine you play a game of fetch with the dog. It takes the dog 60 seconds to run a total of 180 meters. What was the dog's a
vodka [1.7K]

180 meters in 60 seconds is an average speed of 180m/60s = 3 m/s.

3 0
4 years ago
How to control what is on the x and y axis in excel?
kozerog [31]
The value on X you choose first and create a graph then you add values to graphs Y axis.
8 0
3 years ago
When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will
bogdanovich [222]

Answer:

A) True

Explanation:

Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.

7 0
3 years ago
Other questions:
  • Tasha purchased a new tablet. She has several questions about how to connect to the internet, download apps, install software, a
    5·1 answer
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    14·2 answers
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • What does scarcity force people to do?
    11·1 answer
  • The loop body instructions in the _____ statement always are processed at least once.
    6·1 answer
  • A. Calculate the diffusion coefficient for magnesium in aluminum at 450°C.
    14·1 answer
  • Microsoft presentation software tool is called
    10·2 answers
  • What is this app for ?
    10·2 answers
  • I have no idea what I’m doing and this is due in 45 minutes
    7·1 answer
  • Types of libraries in operating system​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!