1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
11

A hard disk is a _ storage device

Computers and Technology
2 answers:
Leokris [45]3 years ago
5 0

electro-mechanical data storage device

lawyer [7]3 years ago
5 0
Electro-mechanical data storage device
You might be interested in
What is the name of a robot astronaut created by NASA
dsp73

<span>
The name of the robot astronaut created by NASA is Robonaut 2.</span>

<span /><span>This robot has arm, legs, a head and a torso. It even has fingers so that it is able to use the same tools that is used by human astronauts. </span>

<span> Hope this helps. :)</span>

4 0
2 years ago
Read 2 more answers
What is the output?
Vinvika [58]

Answer:

20

Explanation:

4 0
3 years ago
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
What are rules that enforce basic and fundamental information-based constraints?
irga5000 [103]
The
answer should be C.
8 0
3 years ago
Find the propagation delay for a signal traversing the in a metropolitan area through 200 km, at the speed of light in cable (2.
Ede4ka [16]

Answer:

t= 8.7*10⁻⁴ sec.

Explanation:

If the signal were able to traverse this distance at an infinite speed, the propagation delay would be zero.

As this is not possible, (the maximum speed of interactions in the universe is equal to the speed of light), there will be a finite propagation delay.

Assuming that the signal propagates at a constant speed, which is equal to 2.3*10⁸ m/s (due to the characteristics of the cable, it is not the same as if it were propagating in vaccum, at 3.0*10⁸ m/s), the time taken to the signal to traverse the 200 km, which is equal to the propagation delay, can be found applying the average velocity definition:

v = \frac{(xf-xo)}{(t-to)}

If we choose x₀ = 0 and t₀ =0, and replace v= 2.3*10⁸ m/s, and xf=2*10⁵ m, we can solve for t:

t =\frac{xf}{v}  =\frac{2e5 m}{2.3e8 m/s} =8.7e-4 sec.

⇒ t = 8.7*10⁻⁴ sec.

4 0
3 years ago
Other questions:
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • 25. Becca is learning how to brush her teeth independently and her therapist/RBT has created an activity schedule to help teach
    6·1 answer
  • Question 14. (3.04 MC) how does the project manager evaluate the scope of a project
    14·1 answer
  • Jeanne writes a song, and Raul wants to perform
    6·2 answers
  • Given a String variable response that has already been declared, write some code that repeatedly reads a value from standard inp
    10·1 answer
  • Compared to a virtual image, a real image
    15·2 answers
  • Users of Adobe Reader, created by Adobe Systems Incorporated, are prompted to provide feedback on their experiences with the sof
    7·1 answer
  • REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW
    14·1 answer
  • Uploading Your Work
    14·1 answer
  • Given an array of integers a, your task is to calculate the digits that occur the most number of times in the array. Return the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!