1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
15

Why should the drives be segregated in a computer?​

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
3 0

Answer:

In computer systems, drives were usually given with numbers for identification. In the earlier systems, manufacturers wanted to ensure that every thing is more simplified so they installed just one or two drives. These were usually identified as Drive A or B.

Earlier computers also lacked the provisions for external storage devices or hard disks. So to store your data you have an option to save it either on Drive A or B so the data could easily be retrieved by the user.

With the arrival of better and improved systems, the need for drive segregation also eliminated such that all data could be stored in a single hard disk.

https://brainly.in/question/4615628

You might be interested in
If data from a DOS system is electronically sent to an EHR or other Windows-based system via an interface to populate an indexed
ra1l [238]

Answer:

yes ! you can see below.

Explanation:

EHR is a health record of a patient that gives information about the patient and securely authorized it. Electronic Health record allows medical professionals to enter data and update a new encounter.

DOC is a document used by Microsoft. DOC file is a file that contains formatted text, images, tables, graphs, and charts, etc.

Unstructured data is data that can be entered in free text format. Structured information is a type of data contain check boxes, images table, and other the user chooses from the given option.

As the DOC system contain free text format, then data in the EHR is structured.

8 0
3 years ago
What is a device driver​
sleet_krkn [62]

Answer:

Explanation:

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer. ...

4 0
2 years ago
Read 2 more answers
Which HTML tag is used to add a paragraph to a web page?
NikAS [45]

Answer:

the HTML tag for the paragraph is <p>.

Explanation:

To insert the paragraph in the website, use the <p> tag to start the paragraph and to end the paragraph, use the closing paragraph tag that is </p>.

The paragraph tag is used inside the body tag. for example,

<html>

 <head></head>

 <body>

   <p>this is a paragraph

   </p>

 </body>

</html>

4 0
2 years ago
3. What is the purpose of the conclusion in an expository essay? (1 point)
Fittoniya [83]
A it makes sense and the conclusion is the wrap up of the essay
7 0
3 years ago
Read 2 more answers
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
2 years ago
Other questions:
  • Which of these statements is true?
    9·1 answer
  • Software that helps run the computer's hardware devices and coordinates instructions between applications is called
    10·1 answer
  • A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
    11·1 answer
  • Who were called “freedmen” during the reconstruction period?
    15·2 answers
  • Hey I don’t have a question I’m just testing something on this app
    6·2 answers
  • What is a orogram to block access to websites
    15·1 answer
  • When an item in a menu is black, it means that _____.
    6·2 answers
  • Edhesive coding practice 3.4​
    13·2 answers
  • Can someone please give me timetable managment system with data structures in java?
    11·2 answers
  • In what ways are super computer different from mainframe computers.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!