1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
9

Flash drives, CDs, external disks are all examples of storage (memory) devices.'True or false?

Computers and Technology
1 answer:
Simora [160]3 years ago
5 0

Answer:

True

Explanation:

Storage or memory devices are simply used for storing data and information either permanently or just for a short time. These devices could be internal or external to the system that uses them. They can either be primary storage devices or secondary storage devices. Examples of the storage devices are;

i. Flash drives  --- Secondary storage

ii. CDs    --- Secondary storage

iii. External disks  --- Secondary storage

iv. SD card (Secure Digital card)  --- Secondary storage

v. RAM (Random Access Memory)  --- Primary storage

vi. ROM (Read Only Memory)  ---  Primary Storage

You might be interested in
What should you change if you want one particular slide to have a different arrangement of text box placeholders?
Ganezh [65]
<span>slide layout you should change the slide layout hope this helps  ................</span>
8 0
3 years ago
What is included in a linked list node?
il63 [147K]

Answer: I a reference to the next node

III a data element

Explanation:

A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.

In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.

Therefore, based on the explanation above, the correct option will be:

I. a reference to the next node

III a data element

7 0
3 years ago
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regar
Maslowich

Answer:

Push notification services.

Explanation:

Push notification services can be used to deliver important messages on mobile devices in an efficient and timely manner. The different mobile platforms such as android, iOS have their services which makes it easy for Jabez to send the messages to users with a specific brand and type of mobile device. The messages will pop up on the mobile device of the user, whether the app or the website associated with notifications is running or not.

7 0
3 years ago
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
Why is information literacy so important?
olga_2 [115]
It promotes problem solving approaches and thinking skills
6 0
3 years ago
Other questions:
  • You are given n sorted sequences each one containing n keys. You may assume n is a power of two. We want to merge them into one
    15·1 answer
  • How might the website owner use theses details other than to verify login details?
    6·2 answers
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • What is an Operating System ??
    7·1 answer
  • Pls help me!!!!!!!!!!!!!!!!!!!
    11·2 answers
  • Ways to be your best digital self?
    7·1 answer
  • In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
    7·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • PLEASE ANSWER FAST.one of the barriers for early "talkies" was the need to manually crank the projector and manually synchronize
    13·1 answer
  • How does the internet help you to improve your:
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!