1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
10

Why must you be careful when handling a hard drive?

Computers and Technology
1 answer:
Nikitich [7]3 years ago
7 0
You must be careful while handling a hard drive because If you’re not careful with it the hard drive may corrupt or crash.
You might be interested in
Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
emmainna [20.7K]

Answer:

HTTP stands for "Hyper Text Transfer Protocol" and is used for transferring readable documents across the internet. This matches the action "You visit a website"

POP3  stands for "Post Office Protocol 3" and is used for reading e-mail.  This matches to the action "You check email in your inbox"

SMTP stands for "Simple Mail Transfer Protocol", and is used for sending email.  This matches the action "You send an email to a friend".

FTP stands for "File Transfer Protocol", and is used for transferring files to and from other machines.  This matches the action "You transfer a text document", although truthfully that description is so vague it actually matches all four of the given protocols.

3 0
2 years ago
What computer use for?
nlexa [21]

Answer:

to give us correct information.

i think

3 0
3 years ago
Read 2 more answers
Which of the following is correct statement ? A
AnnZ [28]

Answer:

D all of the above

Explanation:

because a computer performs all the above_mentioned tasks

4 0
3 years ago
Question 8 of 10
Mama L [17]
The correct answer is A
7 0
2 years ago
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today
myrzilka [38]
Hi,

The word you are looking for is "Trojans".

Hope this helps.
r3t40
4 0
3 years ago
Other questions:
  • On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create
    13·1 answer
  • Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is consi
    6·1 answer
  • When conducting research on the internet, what is a starting point for determining how to start the research?
    5·1 answer
  • A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and
    8·1 answer
  • What do the buttons on the paste options menu do
    11·1 answer
  • Random Access Memory is tempory computer memory that stores works in progress
    7·1 answer
  • In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.
    14·1 answer
  • I NEED TO FIND OUT THE ANSWER!
    15·1 answer
  • 45 points!!
    15·2 answers
  • Which html tag designates links to other web pages?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!