1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
8

Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?3100; 5400; 7200; 10000

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

5,400 because it turns at the right speed, but if it is too fast or too slow, it will not perform at it's fullest potential. Such as speed and storage.

You might be interested in
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
Cerrena [4.2K]

There are different kinds of applications.  Control objects control the flow of the application.

<h3>What works the flow of control in a program?</h3>

In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.

They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.

Learn more about application from

brainly.com/question/23275071

7 0
2 years ago
Which piece of code results in the following? Italics
andriy [413]
Italics

Italics

Italics

Italics


7 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Until the 1990s scaling up was almost always a more cost-effective strategy to increase available computer power because communi
salantis [7]

Answer:

The answer is "Option A"

Explanation:

A single computer component also known as a single-board computer, it is a total machine, which is built on a single silicon chip with functional devices like microcontroller, (I / O), and storage.  

  • It normally uses a device, which has a fanless, small-power computation system, and small-profile design.
  • This model provides very slow communication between the components of single computers, that's why the given statement is true.

8 0
3 years ago
Melissa just bought a new entertainment system for her apartment. It includes a flat-screen TV, surround-sound speakers, and a v
harkovskaia [24]

She should get personal property insurance

4 0
3 years ago
Read 2 more answers
Other questions:
  • Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes
    5·1 answer
  • The approved systems design document is used by programmers, the personnel department, and information systems personnel.
    8·1 answer
  • List the seven basic internal components found in a computer tower
    7·1 answer
  • The IntList class contains code for an integer list class. Study it; notice that the only things you can do are: create a list o
    7·1 answer
  • How does VIDEO CONFERENCE change the way we work today???
    9·2 answers
  • "in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y?"
    11·1 answer
  • Write a full class definition for a class named Counter, and containing the following members:________
    9·1 answer
  • Which one my guys I need help
    7·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!