1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
5

Jonathan works with a team of graphic designers. They have a collection of images and have divided the image editing work among

them. They have their individual computers to work with. Jonathan suggests that the storage device for sharing their work should be of the plug-and-play type. Which storage device is he talking about?
A.
USB drive
B.
CF card
C.
SD card
D.
MMC
Computers and Technology
2 answers:
kondaur [170]3 years ago
5 0

Answer:

A, USB

Explanation:

tatyana61 [14]3 years ago
3 0

Answer:usb drive

Explanation:

You might be interested in
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
OLEGan [10]
Or pointer

VERY similar.
5 0
3 years ago
3. How are you able to create photographs differently than 100 years ago?
Agata [3.3K]

Answer:

it willbe black and white

Explanation:

3 0
2 years ago
Read 2 more answers
which of these describes a property of all elements A. all elements have six electrons B. all elements are pure substances C. al
sergiy2304 [10]
Im guessing the answer would either B or C
3 0
3 years ago
You want to discard your old computer and want to securely erase the data from your hard drive. What program can you use to do t
shtirl [24]

one thing you could do is a factory reset, but that depends on your system

5 0
3 years ago
Other questions:
  • A page-replacement algorithm should minimize the number of page faults. We can achieve this minimization by distributing heavily
    14·1 answer
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • The very first thing I should type when creating a formula in excel is:
    15·2 answers
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • A provides an easy way for workers to interact with their computers
    9·1 answer
  • Write a program that reads a target string from the keyboard and then another sentence string from the keyboard.
    10·1 answer
  • Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
    15·1 answer
  • Examine the following algorithm.
    9·1 answer
  • Mention two strategies of collecting data​
    13·1 answer
  • Which term is defined by the total operating current of a circuit?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!