1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
12

A USB device used to transfer photos from the memory card to a hard drive is called a _____.

Computers and Technology
1 answer:
svetlana [45]3 years ago
3 0
A flash drive. It stores pictures that can be transferred to your hard drive on a laptop, computer, etc
You might be interested in
C. There are two types of computer on the basis of size. true or false​
Veronika [31]

Answer:

False

Explanation:

Different factors, such as processing power, information processing, and the component (CPU) utilised in computers, are used to classify computers. Micro-computers, Mini-computers, Main-frame computers, and Super-computers are divided into four categories based on the components utilised and functionality of the computers.

4 0
3 years ago
42. 43. 44. 45. 46. 47. 48 Abrasion, incised, punctured are examples of (b) strain (c) wound (a) sprain Strain is to muscle whil
Doss [256]

Abrasion, incised, punctured are examples of wound .

<h3>What type of injury is abrasion?</h3>

Abrasions is known to be a kind of superficial injuries that happens to the skin and also the visceral linings of the body.

Note that it also lead to  a break in the lifetime of tissue and as such one can say that Abrasion, incised, punctured are examples of wound .

Learn more about Abrasion from

brainly.com/question/1147971

#SPJ1

5 0
2 years ago
Find the maker(s) of the PC(s) with the fastest processor among all the PCs that have the smallest amount of RAM.
aleksley [76]

Answer:

the makers of PC is Charles's babbage.analog is has small amount of ram

3 0
2 years ago
The alternative to encapsulating security protocol (esp) is _________.
Lina20 [59]
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
8 0
3 years ago
Can someone please help and answer the 6 questions on the bottom of the page
garik1379 [7]

Ivan rigney

John benson      2

Mark nicholls      4

James  mitchell   7

Paul matthews   13

Neil hooper         8

5 0
3 years ago
Other questions:
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-fac
    8·1 answer
  • Given an array declared to hold 100 values, the smallest index that can be used with the array is
    7·1 answer
  • Marginal ________ shows how much money can be made if a producer sells one additional unit of a good.
    7·2 answers
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • A ________ is a material deficiency, or combination of significant deficiencies, that results in more than a remote likelihood t
    6·1 answer
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure
    14·1 answer
  • Implement the following logic in C++, Use appropriate data types. Data types are represented as either numeric (num) or string.
    5·1 answer
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
  • Convert the decimal number 164 into the equivalent 8 bit binary number. ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!