1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
15

A disk with many program and data files scattered on it is said to be ____.

Computers and Technology
1 answer:
Airida [17]3 years ago
5 0
Fragmented would be the answer
You might be interested in
How to solve level 53 on rapid router?
alexgriva [62]

<img src=/static/game/image/actions/go.svg alt=' + ugettext(play= button)= += '= style=width: 4%;> ) def noPermissionMessage():

6 0
2 years ago
When viewing data entered into a spreadsheet, the columns identify _____.?
AlexFokin [52]
The answer is : variables
When viewing data entered into a spreadsheet, the columns identify Variable. The variables later can be used on a formula to help you process any sort of data that is implemented within excels' formula system
3 0
4 years ago
What is the law of the XNOR logic gate?
miskamm [114]

logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR) A logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs and one output. At any given moment, every terminal is in one of the two binary conditions low (0) or high (1), represented by different voltage levels.Mar 6, 2018




Read more on Brainly.com - brainly.com/question/11896675#readmore

6 0
4 years ago
Which version of windows server 2008 must computer be running to create a failover cluster?
Mrrafil [7]
Windows 7 had this problem
6 0
4 years ago
Which of the following film pioneers helped make films widely available to ordinary people?
Verizon [17]
<span>Steven Spielberg, and or Paul Williams

</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Using caller id is part of which step in an effective time management plan
    10·1 answer
  • Apart from confidential information, what other information does NDA help to outline?
    15·1 answer
  • a.Write a Python function sum_1k(M) that returns the sumí‘ í‘ = ∑1푘푘푀푀푘푘=1b.Compute s for M = 3 by hand and write
    15·1 answer
  • According to company policy and administrator must logically keep the Human Resources department separated from the Accounting d
    5·1 answer
  • DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
    6·1 answer
  • The operating system provides a ____, which is the means with which you interact with the computer
    5·1 answer
  • ) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
    9·1 answer
  • In the code snippet, what is the “win” part called in programming?
    12·1 answer
  • What is the advantage of maintaining a list of keywords while creating a design blueprint?
    13·2 answers
  • How to write conclusion of hard disk​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!