1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
12

Type the correct answer in the box. Spell all words correctly. How is it possible to access data from any location? Storing data

on the enables access from any location.
Computers and Technology
1 answer:
romanna [79]3 years ago
5 0

Answer:

optical

Explanation:

The earliest of these was the magnetic device. Computer systems began with magnetic storage in the form of tapes (yes, just like a cassette or video tape). These graduated to the hard disk drive and then to a floppy disk.

You might be interested in
A. Write a Python program to match key values in two dictionaries. Input: {'key1': 1, 'key2': 3, 'key3': 2}, {'key1': 1, 'key2':
KIM [24]

Answer:

Please find the attachment of the code file and its output:

Explanation:

In the first code, two variable "a, b" is defined that holds dictionary value which is defined in the question, in the next step a for loop is declared that hold dictionary key and value and use a method set to check the value is available in the dictionary and use print method to print its value.

In the second code, a package counter is an import as the c for count value, in the next step a variable a is declared, that uses a counter method to hold a dictionary value in its parameter, and in the print method, it uses sort method to print its value.

8 0
3 years ago
What does spyware do on your computer?
faust18 [17]
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owners private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. if this helps any....
6 0
3 years ago
What is the ethical danger of using agents in negotiation?
Mariulka [41]
Information sharing, divergent interests, conflicting interests
6 0
3 years ago
Given a structural design calling for 1-inch rebar with 2 inches of cover and a spacing of 2 inches center-to-center in a 9-inch
7nadin3 [17]

Answer:

Answer is 3/4 inch.

Refer below.

Explanation:

The nominal maximum aggregate size allowed by the ACI 318-08 code is:

3/4 inch

5 0
3 years ago
Read 2 more answers
Each of k jars contains m white and n black balls. A ball is randomly chosen from jar 1 and transferred to jar 2, then a ball is
Elodia [21]

Answer:

#initial probability of getting a white ball

init_prob_white=15/25

#initial probability of getting a black ball

init_prob_black=10/25

#probability of getting a white ball given

#that we transferred a white ball in previous

#step is 16/26 which we represent by pww

pww=16/26

#probability of getting a white ball given

#that we transferred a black ball in previous

#step is 15/26 which we represent by pwb

pwb=15/26

#similarly

pbb=11/26;

pbw=10/26;

#The below two functions are recursive which calculate

#total probability right from the start

#The formula they use are

# Prob(W_k)=Prob(W_k-1)*Prob(W_k | W_k-1)+

# Prob(B_k-1)*Prob(W_k | B_k-1)

def pw(n):

if n==1:

return init_prob_white;

else:

return (((pww)*pw(n-1))+((pwb)*pb(n-1)))

def pb(n):

if n==1:

return 10/25;

else:

return (((pbb)*pb(n-1))+ ((pbw)*pw(n-1)))

#for k=5

k=5

x=pw(k)

print("After "+str(k)+" transfers probability="+str(x))

Explanation:

3 0
3 years ago
Other questions:
  • How to screen shot on a computer
    14·2 answers
  • Which of the following statements are true of network packets? Check all of the boxes that apply. They contain control informati
    10·1 answer
  • 1. Describe a system that would be dangerous if resistance were not a part of the circuit
    12·2 answers
  • Charles is having a lot of problems with errors in a very complicated spreadsheet that he inherited from a colleague, and he tur
    8·1 answer
  • Is there an answer to these picture?
    12·1 answer
  • What happened if the offshore team members are not able to participate in the iterations demo due to timezone/infrastructure iss
    12·1 answer
  • What is the acronym DOS in full
    15·1 answer
  • 4. Write technical term for the following statements
    15·2 answers
  • 17. Write a SELECT query for the palateE4 database that produces a result grid listing paintName, and a count of the occurrences
    12·1 answer
  • The First Web page you will see every time you launch the Web Browser Application is called​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!