1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
6

match the type of secondary storage devices to their examples. CD, hard disk, flash memory. answer choices: magnetic storage dev

ice, optical storage devices, solid state storage devices
Computers and Technology
1 answer:
alisha [4.7K]3 years ago
3 0
Hi pupil here's your answer ::


➡➡➡➡➡➡➡➡➡➡➡➡➡

Column A Column B

1》CD = Optical Storage Devices

2》Hard Disk = Magnetic Storage Device

3》Flash Memory = Solid State Storage


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅


Hope this helps. . . . . . .
You might be interested in
The next scenarios are not part of the Java simulation. Just use your best thinking to answer the
umka21 [38]

Answer:

A) Vector is an upward, downwards, left, and right directions for Emily vector is in the upward, downwards, and right directions for Fran.

B) The force of weight and gravity in the downward direction, the normal force in the upward direction, acceleration force in the right direction and the frictional force in the left direction. Fran doesn't have a frictional force.

C) Emily's velocity will slow down since the ground is being countering her velocity and slowing her down in the opposite direction until she stops. Fran's speed will be constant since there is no friction to slow her down so she will continue to move unless she hits a wall.

Explanation:

3 0
3 years ago
Who created the word robot?
victus00 [196]

Answer:

Karel Čapek      Science Diction: The Origin Of The Word 'Robot' Robot is a relative newcomer to the English language. It was the brainchild of the Czech playwright, novelist and journalist Karel Čapek, who introduced it in his 1920 hit play, R.U.R., or Rossum's Universal Robots.

Explanation:

5 0
3 years ago
Read 2 more answers
What are some cowboy ethics??
lys-0071 [83]

Answer:

giv meh a min plsssss

Explanation:

4 0
3 years ago
Write the formal descriptions of the following sets: (a) The set containing the numbers 5, 9, and 27. (b) The set that contains
Dominik [7]

Answer: a) =\left \{ 5,\,9,\,27 \right \}

(b) \left \{ x\ : X\varepsilon\mathbb{N} \right \text{and}\ x

(c) \left \{\epsilon \right \}

(d) \left \{\right \}=\phi

Explanation:

The formal description of the given sets are as follows :-

a) The set containing the numbers 5, 9, and 27.

=\left \{ 5,\,9,\,27 \right \}

(b) The set that contains all the natural numbers less than 2.

\left \{ x\ : X\varepsilon\mathbb{N} \right \text{and}\ x

(c) The set containing the empty string.

We know that in formal description, the empty string is denoted with \epsilon.

Thus, the required set : \left \{\epsilon \right \}

(d) The set containing nothing at all.

\left \{ \right \}=\phi

7 0
3 years ago
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and
Stolb23 [73]

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

7 0
3 years ago
Other questions:
  • When creating a firewall exception, what is the difference between opening a port and allowing an application through?
    7·1 answer
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • Assignment 3: Chatbot
    11·2 answers
  • What has information technology made piracy possible?
    14·1 answer
  • The list below show test scores for 3rd period on a recent test.
    13·1 answer
  • If you want to insert a column into an existing table, what would you do?
    13·2 answers
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • Question 1 (1 point)
    9·1 answer
  • Jade has to create a workbook for storing information of students participating in the annual state-level sports competition. Th
    5·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!