1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
15

Why should the drives be segregated in a computer?​

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
3 0

Answer:

In computer systems, drives were usually given with numbers for identification. In the earlier systems, manufacturers wanted to ensure that every thing is more simplified so they installed just one or two drives. These were usually identified as Drive A or B.

Earlier computers also lacked the provisions for external storage devices or hard disks. So to store your data you have an option to save it either on Drive A or B so the data could easily be retrieved by the user.

With the arrival of better and improved systems, the need for drive segregation also eliminated such that all data could be stored in a single hard disk.

https://brainly.in/question/4615628

You might be interested in
Which of the following is considered a benefit when using slab allocator?
tatyana61 [14]

Answer:

Option(d) is the correct answer to the given question

Explanation:

The main advantage of slab allocator is that There is no memory is lost because of the fragmentation this is due to some driver data framework has a cache memory that is connected to it.

  • In the slab allocator the resources are repeatedly assigned or free to handle them. It is a type of memory management scheme that is used for distributing resources to the memory.
  • All the other options are not considered as advantages of Slab allocator that's why they are an incorrect options.
7 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
What are the two ways to print a document?
guajiro [1.7K]

Answer:

ctrl+p or find the print button on the page

5 0
3 years ago
Which rules should be remembered when creating formulas using nested functions? Check all that apply.
White raven [17]

Answer:

Use an equal sign at the beginning of the formula (A)

Use open and close parenthesis for each set of nested functions (B)

Functions should be in CAPS

Separate functions with commas

Explanation:

5 0
3 years ago
Read 2 more answers
Differences between barcode reader and character recognition devices​
spin [16.1K]

<u><em>Differences between barcode reader and character recognition devices​:</em></u>

Barcode Reader or Barcode Scanner:  

  • Barcode Scanner scans the data by brightening the barcodes usingSensor
  • The analog signal is then converted into digital signal by Converter.
  • The Decoder calculates the converted data and sends valid data to the computer.  

Character Recognition Devices (OCR):

  • OCR scans the physical document and converts them into two-coloured format.
  • The darker and lighter area are identified as characters and blanks respectively.
  • The common methods used are: Pattern Recognition and Feature Detection.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Dinah is using an I.D.E to write, modify, and save code. Which tool should she use?
    8·2 answers
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • To create a new query in Design view, click CREATE on the ribbon to display the CREATE tab and then click the ____ button to cre
    9·1 answer
  • Which two fields in an Ethernet frame help synchronize device communica- tions but are not counted toward the frame’s size?
    11·1 answer
  • You need to write a program that calculates and displays the revenue earned from ticket sales at a movie theater. Input: Prompt
    11·1 answer
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • Join my discord server! CODE IS (CebjBXN)​
    12·2 answers
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • Communication media that use an antenna for transmitting data through air or water are called _____.
    14·1 answer
  • You are a developer for a news, entertainment, lifestyle, and fashion website. User traffic has steadily increased month-over-mo
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!