1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina18 [472]
3 years ago
6

What is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnet

ically sensitive materials?
Computers and Technology
1 answer:
Elza [17]3 years ago
3 0

Answer:

The correct answer to the following question will be "Magnetic medium".

Explanation:

Some storage device that portrays details or information using magnetic patterns is called a magnetic device.

  • Magnetic tape, and hard drives are the commonly used magnetic storage devices.
  • This will be the method by which magnetic methods are used to hold and retrieve information on tapes.

So, it's the right answer.

You might be interested in
The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
Alona [7]

Answer:

ArrayList a contains [2, 3, 3, 3, 4, 5, 3, 2, 1]

Explanation:

Given

The removeValue method

Required

The content of ArrayList a, after the method is called

From the question, we understand that arraylist a is:

a= [2, 3, 4, 3, 3, 4, 4, 5, 4, 3, 2, 1]

val =4

The function fails when the value to be removed appear consecutively in the list.

4 appears in index 5 and 6 of the list. Only one of the 4's will be removed

So, the updated list will be: [2, 3, 3, 3, 4, 5, 3, 2, 1]

6 0
3 years ago
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
HELP URGENTLY!!!!!
Ganezh [65]
Which field TCP header is not typically used in modern networks
5 0
3 years ago
The conceptual phase of any system or just the software facet of a system best describes the sdlc
geniusboy [140]
I think its the systems investigation phase.
5 0
3 years ago
To avoid splitting a worksheet in awkward places, you can insert a _____ to specify a specific breaking point.
alexandr1967 [171]
A Manual Page Break
8 0
3 years ago
Other questions:
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • Why do so many people think the revision stage is the hardest
    13·2 answers
  • The company called ____ offers a complete graphic information system software solution for computer-generated maps that stores a
    8·1 answer
  • Michale spent 80 minutes at the libary he finished studying at 4:00 what time did michale start studying
    8·1 answer
  • To rename a database object, press and hold or right-click the object in the navigation pane and then tap or click ____ on the s
    10·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • The AND operator is a disjunction and the OR operator is a conjunction.
    15·1 answer
  • Question #8
    13·1 answer
  • Which of the following is a quality of a mixed economy?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!