1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
2 years ago
8

What directs the read/write arm of the hard drive to where data exists and accesses it upon the user's request?

Computers and Technology
1 answer:
Nastasia [14]2 years ago
7 0

Answer:

NTFS (New Technology File System) or FAT(File Allocation Table) are used to direct read/write arm of hard drive to where data exists and access it upon user's request

Explanation:

Both NTFS and FAT are used but NTFS is fast and optimal and superseed the FAT and supported by windows NT 3.1 and later versions.  

You might be interested in
The stack pop operation
lys-0071 [83]

Answer:

extracts one element from the stack and returns it

Explanation:

Basically,  a stack is an abstract data type that serves as a collection of elements. It has two principal operations:

push, which adds an element to the collection, and

pop, removes an element from the Stack and returns the removed element  This operation is often found in c and java programming.

Therefore, the correct option in our case is that the stack pop operation extracts one element from the stack and returns it.

6 0
2 years ago
20 Points!! Please hurry!!
ahrayia [7]

Answer:

the answer is Navigation form

8 0
2 years ago
What are some of the potential sources of risk in a systems analysis and design project? How does the project manager cope with
Alexeev081 [22]

Answer:

Project management set of processes for risk management include, for coping with risk the project manager need to do the following:

Risk Planning

Risk Identification

Risk Analysis (Qualitative and Quantitative)

Risk Response Planning

Risk Monitoring and Control

Environmental Risks

External Risks

Design Risks

Engineering Services Risks

Right of Way Risks

Construction Risks

Project Management Risks

Organizational Risks

Other risks are : (article ITToolbox sources of risk)

Customer Risk

technical Risk

Delivery Risk

Explanation:

5 0
2 years ago
To calculate the multiple of 5
Anastasy [175]

Answer:

more information

Explanation:

lllll

5 0
2 years ago
What does it mean when system ui has stopped?
Andru [333]
One of the most common errors on electronic devices. This Error indicates that an update was "corrupted" or "Unsuccessfully patched"
7 0
3 years ago
Other questions:
  • 안녕하세요! 한국어도 여기서 사용 가능한지 궁금합니다.
    6·2 answers
  • Audio editing software contains several codecs that allow you to
    15·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • dam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correct
    9·1 answer
  • We define the following terms:
    11·1 answer
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • Give 4 examples of mnemonic codes, and what do they do?
    15·1 answer
  • PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or _________
    12·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • What is computer specification
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!