1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
6

What happens when a flash memory card is installed in a slot and it is recognized by windows?

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
6 0
You would get a notification that you just installed a device
You might be interested in
Compare and contrast hardware and software.
lesya692 [45]
Hardware:
-physical parts of a computer that cause processing of data
-can be connected (physically) & can touch
- Hardware wares out during/over time
-Hardware failure is random
Software:
-A set of construction that tells a computer exactly what to do
-software is logical in nature
- dose not have an increasing failure rate

Similarities
- Behavior; Users interact with the products in various ways

- Products produce outputs and given inputs

-they have functional (user facing) and non functional (non user facing) requirements

-They are both complex (any representation of product specifications lead to a main structure)


Differences
- Software is easier to change then hardware

- Software testing is done by specialized quality assurance (QA) engineers, while hardware is done by engineers who are creating the product

-Hardware must be designed and tested to work over a range of time and environmental conditions, which is not the case for software

- Hardware designs are constrained by the need to incorporate standard parts

(Hope this helps?)
7 0
1 year ago
Read 2 more answers
What is the duty of WHH? (white hat hackers)<br><br><br>ANY WHH HERE?<br>​
Minchanka [31]
White hat hackers use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers. They can sometimes be paid employees or contractors working for companies as security specialists who attempt to find gaps in security.
6 0
2 years ago
Buying an existing business
HACTEHA [7]
Goin to make great profit
8 0
2 years ago
What single awk command can be used to display all the login names and their associated numerical user IDs
Luden [163]

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

8 0
3 years ago
This process can be applied to help workers choose the best telecommunications technology to do a specific task.
Lisa [10]
B. Internet Telephony would be my best guess. I'm not that good with computers. Hope this Helps :-)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • You often insert your company's logo into documents you create. One way to make it easier for you to quickly insert it is to sav
    10·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • What would be one duty of a network administrator
    12·1 answer
  • All of the following are strategies to help you prepare for standardized test except <br>​
    5·1 answer
  • What are MIDI signals?
    12·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • What help in executing commands quickly
    5·1 answer
  • Describe FIVE distinct features of multi-threaded programming. Your answer should be language independent. g
    9·1 answer
  • Which one is exit controllefd loop ?<br>1.while loop <br>2. for loop<br>3. do loop<br>4. none <br>​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!