1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
12

Type the correct answer in the box. Spell all words correctly. How is it possible to access data from any location? Storing data

on the enables access from any location.
Computers and Technology
1 answer:
romanna [79]3 years ago
5 0

Answer:

optical

Explanation:

The earliest of these was the magnetic device. Computer systems began with magnetic storage in the form of tapes (yes, just like a cassette or video tape). These graduated to the hard disk drive and then to a floppy disk.

You might be interested in
Jasmine is a commercial artist her is is the one most often used by graphic designers publishers and others in her field the os
VikaD [51]
OS is for mac so she used the mac computer
7 0
2 years ago
What are the WORST computer malware in your opinion it can be worms backdoors and trojans I just want a input, nothing right or
tankabanditka [31]

Answer:

I think probably mydoom

Explanation:

as it estimated 38 billion dollars in damage, also this malware is technically a worm

5 0
2 years ago
Riley needs more storage space on his small laptop, and he needs that storage to be accessible without Internet access. What is
galina1969 [7]

Answer:

i cloud

Explanation:

but if you dont gota paypal youd want to get like an std card or somthime

8 0
3 years ago
The conceptual phase of any system or just the software facet of a system best describes the sdlc
geniusboy [140]
I think its the systems investigation phase.
5 0
3 years ago
In this exercise, you will create a couple of helper methods for ArrayLists in a class called ArrayListMethods.
nata0808 [166]

Answer:

package lab1;

import java.util.ArrayList;

import java.util.Iterator;

public class ArrayListMethodsTester

{

public static void main(String[] args)

{

ArrayList<String> stringArray = new ArrayList<String>();

stringArray.add("This");

stringArray.add("is");

stringArray.add("an");

stringArray.add("ArrayList");

stringArray.add("of");

stringArray.add("Strings");

System.out.println("Printing the arraylist:");

ArrayListMethods.print(stringArray);

System.out.println("\nArrayList is condensing:");

ArrayListMethods.condense(stringArray);

ArrayListMethods.print(stringArray);

System.out.println("\nArrayList is duplicating:");

ArrayListMethods.duplicate(stringArray);

ArrayListMethods.print(stringArray);

}

}

class ArrayListMethods

{

static void print(ArrayList stringArray)

{

  Iterator it = stringArray.iterator();

  while (it.hasNext())

     System.out.println(it.next() + " ");

     

}

static void condense(ArrayList stringArray)

{

  int length=stringArray.size();

     

  ArrayList cloneArray=(ArrayList) stringArray.clone();

     

  stringArray.clear();

  StringBuilder sb=new StringBuilder("");

     

  for (int i = 0; i < (length/2); i++)

  {

      sb.append(cloneArray.get(i));

      sb.append(" ");    

  }

  stringArray.add(sb);

     

  StringBuilder sb1=new StringBuilder("");

  for (int i = (length/2); i < length; i++)

  {

      sb1.append(cloneArray.get(i));

      sb1.append(" ");    

  }

  stringArray.add(sb1);

  }

static void duplicate(ArrayList stringArray)

{

  for (int i = 0; i < stringArray.size(); i+=2)

  {

      stringArray.add(i+1,stringArray.get(i));

  }

}

}

Explanation:

  • Get the length of the arraylist  to copy the array into another arraylist .
  • Empty the array so that new content can be stored in it .
  • Use a loop to half of array_list.
  • Use a loop from half of array_list to the end of arraylist and  append all into a single string.
5 0
3 years ago
Other questions:
  • List four examples of soft and hard skills
    10·2 answers
  • What formatting option is easiest to read when printed out
    12·1 answer
  • An sObject named Application _c has a lookup relationship to another sObject named Position_c.
    12·1 answer
  • Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
    14·1 answer
  • Most software packages have functions for generating _____ about columns of data, which include statistical summaries like contr
    7·1 answer
  • According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.
    13·2 answers
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
  • Which of the following statements best compares and contrasts hot and cold type?
    12·1 answer
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!