1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
10

Devices that allow for the retention of data when your computer has been shutdown

Computers and Technology
1 answer:
zepelin [54]3 years ago
4 0
That would be persistent storage devices (non-volatile memory)
- hard disk drives (mechanical)
- solid state drives (electronic / NAND flash)
- CD (optical)

If u need more I can give u a few more
You might be interested in
Why are typewriter keys arranged the way they are?
loris [4]
They are arranged the way they are because of the QWERTY layout. It was used to slow down how people typed so they wouldn't get the typewriter jammed. Hope this helps. :)
4 0
4 years ago
During project management, who executes tasks and produces the deliverables as stated in the project plan and as directed by the
san4es73 [151]
B. Project team members
8 0
3 years ago
What type of software resides on a computer’s hard drive, and controls the CPU and all other activity between components?
myrzilka [38]
Operating System  (OS) is the answer.

An application runs in/on an OS.  It is not the OS itself. Like Word or Chrome are applications. 

Systems is too generic and not specific enough to mean anything in this context.  Throw away answer.

Network Operating System does not 'usually' run on a hard drive but on memory chips in things like routers, wireless access points and switches that move network traffic.


3 0
3 years ago
Match the definition with the corresponding word
Oksana_A [137]

Answer:

Ram is your memory

that's all i know

4 0
4 years ago
Read 2 more answers
An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traf
Sonja [21]

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

7 0
3 years ago
Other questions:
  • Using features on demand results in saving potentially significant amounts of disk space. features on demand becomes a third ins
    14·1 answer
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • Which sign or symbol will you use to lock cells for absolute cell reference
    5·1 answer
  • what are Include the data on usage you gather from your interactions with friends or by listening to people on the radio or on T
    7·1 answer
  • What tasks do most operating systems perform?
    15·1 answer
  • Create a function (prob3_6) that will do the following: Input a positive scalar integer x. If x is odd, multiply it by 3 and add
    15·1 answer
  • A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries
    9·1 answer
  • . Define the process of Technological relationship
    12·1 answer
  • How does naming affect a variable’s creation and use?
    6·1 answer
  • An end-user license agreement protects _____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!