1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
4 years ago
12

Jessica wants to purchase a new hard drive. She wants a drive that has fast access because she will use it to edit videos on her

PC. She also needs a lot of storage and wants to have at least 4 TB available to save her videos. Jessica wants to keep the cost down as much as possible. What type of hard drive should Jessica purchase?
Computers and Technology
1 answer:
disa [49]4 years ago
8 0

Answer:

7200 RPM magnetic HDD with 4tb disk size.

Explanation:

The computer system storage is a hardware component used to store data permanently. It holds the operating system software files used to boot the system. The processor retrieves data from the hard disk drive to processing and stores the output back to the drive.

The RPM or resolution per minute is the speed of the disk on the drive per minute, the faster the disk, the faster the drive saves and transfer data.

The 4tb 7200 RPM magnetic HDD has a speed of 7200 resolution per minute, making it fast for saving and trimming and provides large storage space.

You might be interested in
A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
Rzqust [24]

Answer:

C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.

Explanation:

Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.

7 0
3 years ago
The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and th
MrRa [10]
<span>The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and the long run, is called a production function.

Hope I helped ;)
</span>
3 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Write a program to print sum on first 10 natural numbers.
Kamila [148]

sum of 10 natural number is 55

4 0
3 years ago
No PFP gang<br> lollolololololol
Lorico [155]
Yeah lol i don’t have one either
3 0
3 years ago
Read 2 more answers
Other questions:
  • What kinds of variables are accessible from outside of the class?
    8·1 answer
  • What is the purpose of using modulo 2 arithmetic rather than binary arithmetic in computing an fcs?
    7·1 answer
  • QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
    14·1 answer
  • What is an advantage and disadvantage to file compression
    8·1 answer
  • _____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day
    14·1 answer
  • when you assign a(n) ___ to a field, Access will display the value you assign, rather than the field name, in datasheets and in
    15·1 answer
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    10·2 answers
  • Define cyberstalking ?​
    6·2 answers
  • Name 3 supercomputers along with their cost, purpose and the country it is located.​
    15·1 answer
  • One difference between multi-tasking using fork() versus using threads is that there is race condition among threads due to shar
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!