1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
3 years ago
9

_______medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated wi

th magnetically sensitive materials.
Computers and Technology
1 answer:
KiRa [710]3 years ago
7 0

Answer:

The answer is Magnetic

Explanation:

Magnetic medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.

Magnetic based drives, for example:- Hard disk. Floppy Disk. Magnetic tape.

Optical based drives, for example:- CD drive (ROM and RW) DVD drive (RPM and RW)

Flash or solid state chip based drives, for example:- USB drive. SD cards.

You might be interested in
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
pantera1 [17]

Answer:

All of the above

Explanation:

6 0
2 years ago
A _____ is usually a smaller version of a data warehouse
Strike441 [17]
A ( micro ) is usually a smaller version of a data warehouse
4 0
2 years ago
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
3 years ago
Which technology do online storesusually use to present customized content?
k0ka [10]

Answer:

real time analytics technology

Explanation:

Online stores usually use real-time analytics technology to present customized content. Explanation: Real-time analytics is gaining popularity nowadays. It is basically the procedure of measuring and preparing the data as it enters the database

8 0
2 years ago
Python's ____ mechanism allows the programmer to view an interface for an entire class or an individual method, at the shell pro
eduard

The question above has multiple choices as follows;

a. API

b. docstring

c. help

d. man

Well, I am stuck between B and C. I’ll however settle for (B) docstring.


Python docstrings provide an easier way to associate documentation with python classes, modules and functions. The interactive help function on the other is built in and is intended for interactive use. This function exists to view help interactively. With the help feature, you can quickly learn classes, modules, functions and many more.






8 0
3 years ago
Other questions:
  • Consider the following method.
    13·1 answer
  • A model release can be either oral or written down. true or false
    13·2 answers
  • Anybody good with Microsoft excel? I need help with this class.
    9·2 answers
  • Which is true of ASCII and Unicode?
    7·1 answer
  • Help me decide this hurry
    12·1 answer
  • Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
    6·1 answer
  • Which of the following is the file type of Microsoft® Publisher files?
    12·2 answers
  • Which option correctly identifies if the researcher’s approach was the best choice in the following scenario and explains why?
    10·2 answers
  • What is system software?
    14·1 answer
  • You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from usin
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!