1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
7

What types of storage can be used to access your data on another computer?

Computers and Technology
1 answer:
Ivenika [448]3 years ago
6 0
<span>You could use cloud storage. Basically, the things you save are actually saved on another computer, that is, on another server, that is used as a hard drive for many pcs. You can access the cloud storage if you have internet and it works like a normal hard drive. There are even laptops that don't have storage other than cloud storage.</span>
You might be interested in
Digital security measures include _____. Select 2 options.
elixir [45]

Answer:

firewalls

passwords

8 0
3 years ago
Read 2 more answers
. Here is a sequence of addresses during execution of some program: 4, 16, 0, 20, 52, 68, 172, 64 Assuming a fully associative c
k0ka [10]

Answer:

See explaination for the illustrations on the question.

Explanation:

A program cache miss usually occurs at the instance of an instruction fetch failing to read an instruction from the program cache and the processor is required to access the instruction from the next level of memory. A request to L2 or external memory has a much higher latency than an access from the first level instruction cache.

A cache on its own can be defined as is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory.

Please kindly check attachment for the step by step diagramming illustrations of the questions.

6 0
4 years ago
Which of the following is true of lossy and lossless compression algorithms?
taurus [48]

B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

7 0
3 years ago
Use the Web to search for different ways to share an Access database, such as the one for Colonial Adventure Tours, with others
stellarik [79]

Answer:

Check the explanation

Explanation:

There are certainly many ways through which we can access and share database. The different ways to share an access database are as follows:  

1. By using Sharepoint site: To utilize the SharePoint you should have windows SharePoint services server enabled on your system. Sharepoint assists in making database accessing very convenient by using methods like linking to list and publishing a database.  

2. By using database server: This technique split a database that the tables are stored on the network in which each user has a copy of an access database file. The database file comprises of tables which contain queries, reports, forms, and other database objects.  

3. By using split database: This technique is utilized when a database server product or a SharePoint site is unavailable. The tables then gains access into one access file and everything goes to other access files.  

4. Network Folder: In this technique database file is stored on a shared network device and users can use the file simultaneously.  

Below is the table for necessary hardware and software:

                                                   Sharepoint  database     split       Network

                                                         site          server    database    Folder

Need for database server software?No             Yes       No        No

Need for windows server?                Yes              No        No        No

6 0
4 years ago
A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.
Dafna11 [192]
Computer virus, a software program that is designed to cause damage to the computer system or perform some other
malicious act
5 0
2 years ago
Other questions:
  • On what level has social media connected us to one another?
    11·1 answer
  • When a piston has three rings, the bottom ring will be?
    9·1 answer
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    14·1 answer
  • The Internet is not a good place to connect with people when looking for a job.
    10·1 answer
  • Which protocol sends a request to view or download a website or file ​
    7·1 answer
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
  • Which company introduce the first Minicomputer in 1960.​
    8·2 answers
  • Why does your e-learning course need a title slide?
    10·2 answers
  • What are the effects of information systems in the management of corona ?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!