1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
11

peter has recently bought a media player and a digital camera. he wants to buy a memory card for these devices. which memory dev

ice should peter use in his digital camera and media player?
Computers and Technology
1 answer:
goldenfox [79]3 years ago
3 0
He can use a micro SD card, as well as he can use an adapter along with that SD card.
You might be interested in
Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
Ann [662]

Answer:i think its D it makes more sense also can i get brainliest

Explanation:

5 0
3 years ago
Read 2 more answers
Question 12 There are ____ octets in an IP address.
Marta_Voda [28]
The standard IP convention used in today's network is IPv4. Taking for example one basic IP address we have 192.168.1.1 - The ff IP has 4 octets. An octet is a group of 8 bits on the sample, we have 4 Octets making up 32 a standard 32 bit address.
6 0
4 years ago
All states that have altered judicial selection techniques in recent years have adopted some form of:
BigorU [14]

Answer:

Merit Selection.

Answer choice D.

4 0
3 years ago
Read 2 more answers
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
Other questions:
  • A company is inviting design for its new corporate logo from its users. This is an example of ? A. Crowdfunding B. Crowdvoting C
    7·2 answers
  • Which structure does a web page normally use to define an area of focus?
    8·1 answer
  • Is a way of grading web pages by the number of other web pages that link to them?
    10·1 answer
  • What is syntax?
    6·1 answer
  • What does sustainable mean<br>​
    7·1 answer
  • During wave motion, the motion of particles to one side of the rest position will be______ the motion to the other side of the r
    12·2 answers
  • ) What does sampling mean?
    13·1 answer
  • Explain the applications software that you use everyday
    5·1 answer
  • Write a function that accepts a cell array StudentScores consisting of the following:
    12·1 answer
  • Choose the correct statement:_______.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!