1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
8

Compare the two types of formatting that IDE devices must go through. What is the primary difference between the two?

Computers and Technology
2 answers:
Andrei [34K]3 years ago
7 0
A quick format<span> changes the file system while the </span>full format<span> also checks the </span>drive for bad sectors.  <span>The scan for bad sectors is the reason why the Full </span>format<span> takes twice as long as the </span>Quick format<span>. If you choose the </span>Quick format<span> option, the </span>format<span> removes address files from the partition, but does not scan the disk for bad sectors.</span>
const2013 [10]3 years ago
4 0

Answer:

There are two types of formatting the IDE devices must go through:

  1. Quick Formatting
  2. Full Formatting

Explanation:

Quick Formatting only writes the blocks that contain the file system structure while Full Formatting access each sector on the disk and write zeros to all data sectors. that is the reason why Full Formatting takes more time.

One reason you might want to do Full Formatting is when you want to give away your disk. In this case, Full Formatting will access each sector and erase the data completely.

You might be interested in
Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
yarga [219]

Scripting languages are unique computer languages because they automate task that could be done by human operator and are easy to use.

<h3>What is a scripting language?</h3>

Scripting languages are programming languages that is interpreted.

They are programming languages that automates the task that will originally be performed by a human operator.

Scripting languages are used to give instruction to other software to run accordingly to how you want it.

The scripting language is different form other language base on the fact that its interpreted . This means the code are translated to machine code when it is run.

The major advantage of scripting languages is that it is human readable and understandable.

Examples of scripting languages are Python and JavaScript.

learn more on scripting here: brainly.com/question/12763341

#SPJ1

3 0
2 years ago
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
You configure a Windows laptop for a user who frequently travels and must connect to several wireless networks. While at a new b
aliina [53]

Answer:

Turn on file and printing sharing for all networks.

Explanation:

Windows has several security features when connecting to a network. In the control panel, you can access to Network and internet > Network and sharing center > Advanced sharing options. There you will see 3 different profiles, one for private networks, one for guest or public networks, and one for all networks.

You should take one of the 2 options. Enable file and printer sharing for all networks, so he can just print without doing anything more. Or keeping the print sharing just for private networks, and adding his new branch office's network to the private networks list.

8 0
3 years ago
What is The scientific name for plastic​
SVETLANKA909090 [29]

Answer:

Polyethylene or polythene (abbreviated PE; IUPAC name polyethene or poly(methylene)) is the most common plastic in use today.

Explanation:

8 0
2 years ago
Other questions:
  • What allows multiple computers to join the same network
    11·1 answer
  • Which language is the most popular language for writing apple os x?
    9·1 answer
  • During which step of the problem-solving process would group members combine and elaborate on ideas? Define the problem. Analyze
    12·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • A top level class may have only the following accessmodifier.
    7·1 answer
  • When youre working with a word processing document and you press the Del key what happens
    10·1 answer
  • How does light move? Shift? Bounce between different objects?
    9·1 answer
  • . How to insert Section Break in Microsoft word 2016 ?
    14·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
  • Which statement is true about the energy of electromagnetic radiation?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!