1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
6

A write once, read many (worm) disc is a common type of _____.

Computers and Technology
1 answer:
Sidana [21]3 years ago
4 0

I guess the correct answer is optical storage

Οptical stοragе is thе stοragе οf data οn an οptically rеadablе mеdium. Data is rеcοrdеd by making marks in a pattеrn that can bе rеad back with thе aid οf light, usually a bеam οf lasеr light prеcisеly fοcusеd οn a spinning οptical disc.

You might be interested in
What is a motherboard​
aleksandr82 [10.1K]

Answer:

A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system

Explanation:

8 0
3 years ago
What does ;-; mean during a text?
zzz [600]

Answer:

Its like an emotionless crying face, mainly used for humor

Explanation:

5 0
3 years ago
Read 2 more answers
How can you tell if your car is overheating?
Nitella [24]
A) your temp gauge is moving into red
4 0
3 years ago
Read 2 more answers
What is the best way to study for an exam?
cupoosta [38]

AnswerB

Explanation:Makes since to look over the notes each night before the exam

8 0
3 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • What financial behaviors will typically lead to a low credit score?
    14·1 answer
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • Which plan includes procedures and processes that ensure the smooth functioning of the business even after a disaster?
    14·2 answers
  • What do you do when ur grounded from all electronics and can't go outside and have t clean all day
    10·1 answer
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • A small square at the right corner of the table is what?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!