1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
8

Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?3100; 5400; 7200; 10000

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

5,400 because it turns at the right speed, but if it is too fast or too slow, it will not perform at it's fullest potential. Such as speed and storage.

You might be interested in
What is the shortest sequence of MIPS instructions that extracts a field for the constant values of bits 7-21 (inclusive) from r
mixer [17]

Answer:

What is the shortest sequence of MIPS instructions that extracts a field for the constant values of bits 7-21 (inclusive) from register $t0 and places it in the lower order portion of register $t3 (zero filled otherwise)? - sll$t0, $t3, 9# shift $t3 left by 9, store in $t0

srl $t0, $t0, 15# shift $t0 right by 15

Explanation:

The shortest sequence of MIPS instructions that extracts a field for the constant values of bits 7-21 (inclusive) from register $t0 and places it in the lower order portion of register $t3 (zero filled otherwise) is shown below:

sll$t0, $t3, 9# shift $t3 left by 9, store in $t0

srl $t0, $t0, 15# shift $t0 right by 15

4 0
3 years ago
Question 7 * What is the default powerpoint standard layout A Blank B Title slide C Title only D. Comparison ​
lesantik [10]

Answer:

B. <u>Title</u><u> </u><u>slide</u><u> </u>layout is the default PowerPoint standard layout.

3 0
2 years ago
List two functions of the UPS​
Alja [10]

Answer:

To protect equipment in the event of power-cut

To ensure stable supply of current (protects against surges)

Explanation:

4 0
3 years ago
Hi AllyUbongAbasiEtuk
Ainat [17]

Answer:

not a valid question

Explanation:

4 0
4 years ago
Read 2 more answers
_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or scre
Lady_Fox [76]

Answer:

Trojan horses

Explanation:

4 0
2 years ago
Other questions:
  • A concave lens is also called a diverging lens. please select the best answer from the choices provided t f
    6·1 answer
  • How to create a function, called separate_int_and_str, which takes in a list and separates out the integer values and strings in
    9·1 answer
  • Freya realizes she does not have enough in her bank account to use the debit card. She decides to use a credit card instead. Whi
    7·2 answers
  • During college jesse spent four semesters studying abroad in other parts of the world how could jesses time abroad benefit his e
    5·2 answers
  • When protecting a worksheet all cells are locked by default.?
    10·1 answer
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • One benefit of open source software is that it
    9·1 answer
  • The advantage of a digital camera in taking nighttime photographs is that you can see
    10·1 answer
  • You are hired by a game design company and one of their most popular games is The Journey. The game has a ton of quests, and for
    12·2 answers
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!