1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
14

Janet has created a 3D movie. She wants to make a copy of the movie and store it for future use. Which device should she use?

Computers and Technology
1 answer:
Valentin [98]3 years ago
3 0

She can use secondary storage devices like:

1) Hard Disk

2) Floppy disks

3) Pen-Drives

You might be interested in
I WILLLLL CHOOOOSEEEE YOU ASSS BRAINLESTTT!!! , HELLPPPPP MEEEE DUEEEE TODAYYYYYY!!!!
Ivenika [448]

Answer:

rohot will not start well when we try to start .....they will make a unique sound or a noise sound like something wrong inside ...reduce their body flexibility. they will not able to move or do works well..loss of jobs ..and opportunities. .

Explanation:

I hope it will help u ....

6 0
3 years ago
Read 2 more answers
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
The advantage of a digital camera in taking nighttime photographs is that you can see
stepan [7]

Answer:

Ima say true

Explanation:

7 0
3 years ago
What kind of Base Error Rates are evident in more complex activities such as programming a computer? Select one: a. 2% b. 70% c.
andreev551 [17]

Answer:

The Base Error Rates evident in more complex activities such as programming a computer is:

a. 2%.

Explanation:

Any error rate higher than the above (2%) will be considered too high.  Most of these errors can be traced to the source of the error (syntax, runtime, or logic errors) or to the type of the error (mistakes, failures, or slips).  No matter the source or type, errors occur from human activities or involvements in the programming.  However, standards have not been established for programming errors yet.

4 0
3 years ago
Joe is examining the logs for his web server and discovers that a user sent input to a web application that contained the string
alexira [117]
SQL Injection Attack
6 0
2 years ago
Other questions:
  • Discuss OPENGL instruction to draw the following drawing primatives:
    14·1 answer
  • John, the network administrator of XYZ Corporation, is interested in changing the format of text from the American Standard Code
    10·1 answer
  • What are the pros and cons of the internet’s ability to access information
    8·2 answers
  • Llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
    7·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Identify a true statement of a JavaScript program in a web form.
    15·1 answer
  • java A palindrome is a word or a phrase that is the same when read both forward and backward. Examples are: "bob," "sees," or "n
    5·1 answer
  • Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
    13·1 answer
  • Follow the directions below to submit Assignment 2:
    11·1 answer
  • A programmer is creating an algorithm that will be used to turn on the motor to open the gate in a parking garage. The specifica
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!