1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
3 years ago
9

_______medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated wi

th magnetically sensitive materials.
Computers and Technology
1 answer:
KiRa [710]3 years ago
7 0

Answer:

The answer is Magnetic

Explanation:

Magnetic medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.

Magnetic based drives, for example:- Hard disk. Floppy Disk. Magnetic tape.

Optical based drives, for example:- CD drive (ROM and RW) DVD drive (RPM and RW)

Flash or solid state chip based drives, for example:- USB drive. SD cards.

You might be interested in
What are listed in the vertical columns across the top of the Event Editor?
jeka57 [31]

Answer:

a

Explanation:

7 0
4 years ago
Read 2 more answers
What you can do with the custom shape tool?​
olchik [2.2K]

Answer:

ANSWER MY QUESTION PLS (( with a custom shaped tool u can create almost anything)

Explanation:

5 0
3 years ago
Ask the user to input a number less than 100. Print all the numbers from that number to 100.
Ber [7]

Answer:

The second one:

num = int (input("Enter a number between 1 and 100: "))

c = num

while (c <= 100):

print (c)

c = c + 1

Explanation:

First of all, you don't know Python... (LEARN IT)

Second of all, The first loop doesn't make sense? num 100

And the second one works, you can try compiling it (lazy to explain...).

8 0
3 years ago
Read 2 more answers
What will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-en
Whitepunk [10]

Answer:

The answer is "Option a and Option f"

Explanation:

The cross-site programming and Server-Side Requests fraud were activities that can have negative effects as these are assaults that directly affect your cloud-based servers via web apps. Although the remainder of an attack could be controlled with these approaches, then they can affect the encryption keys only less.

4 0
3 years ago
WILL MARK BRAINLIEST AND 20 POINTS
Fantom [35]
With templates, you can Create a new document based on previous formatting, create a custom template for future use, and apply different templates to different pages of a document.
4 0
3 years ago
Other questions:
  • in a mechanism when the input goes from a small gear to an output which is a larger gear will the speed increase or decrease?
    5·1 answer
  • Declare k, d, and s so that they can store an integer, a real number, and a small word (under 10 characters). Use these variable
    13·1 answer
  • Which Google Analytics visualization compares report data to the website average?A. Pivot viewB. Comparison viewC. Performance v
    8·1 answer
  • A dedicated website was created where fans could post photos of the pages from decoded that they found. in the communication pro
    11·2 answers
  • Hard drive access time is measured in
    11·1 answer
  • The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal u
    11·1 answer
  • PLEASE HELP ASAP IT'S DUE TODAY! WILL GIVE BRAINLIEST, FIVE STARS, AND THANKS!! PLEASE HELP!
    12·1 answer
  • Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after
    9·2 answers
  • which of the following is a likely problem for a driver in an urban area? A. fame animals on the roads B.not finding a gas stati
    6·1 answer
  • Can someone plz explain me what this button does and I’m scared to click it
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!