1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
3 years ago
11

6. Which is not considered a storage device a. USB Flash Drive b. External hard Drive c. MS-Windows d. Internal Hard Drive e. Me

mory Cards​
Computers and Technology
1 answer:
Lana71 [14]3 years ago
6 0

Answer:

MS-Windows

Explanation:

MS-Windows is an operating system not a storage device.

You might be interested in
Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized
Nadusha1986 [10]

Answer:

ae

Explanation:

4 0
3 years ago
Which of the following is an example of self-awareness?
DENIUS [597]
Are you sure this is the right subject
4 0
3 years ago
Suppose there is exactly one packet switch between a sending user and a receiving user. The transmission rates between the sendi
Paha777 [63]

Answer:

L(\frac{1}{R_1}+\frac{1}{R_2}  )

Explanation:

R_1 is the transmission rates between the sending user and the switch while R_2 is the transmission rates between the switch and the receiving user and the length of the packet is L

Considering no propagation delay the time taken to transmit the packet from the sending user to the switch is given as:

t_1=\frac{L}{R_1}

the time taken to transmit the packet from the switch to the receiving user is given as:

t_2=\frac{L}{R_2}

therefore the total end-to-end delay to send a packet is:

t=t_1+t_2=\frac{L}{R_1}+\frac{L}{R_2} =L(\frac{1}{R_1}+\frac{1}{R_2}  )

6 0
3 years ago
In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
babunello [35]

Answer:

penetration.

Explanation:

In penetration testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt their own systems by exploiting documented vulnerabilities.

4 0
3 years ago
What is your stand about research?
alexdok [17]

Answer:

Hope it helps..

Explanation:

research is the organised and systematic method of finding answers to question. it is systematic because it is a process broken up into clear steps that lead to conclusions. research is organised because there is a Plant Structure or method used to reach the conclusion .

PLEASE MARK ME AS BRAINLIEST

5 0
3 years ago
Other questions:
  • Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other
    6·1 answer
  • Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
    8·1 answer
  • Methods used to change variables are called ______. equals accessors toString void mutators
    5·1 answer
  • Which of the following are personal video journal entries posted on the web? Select one: A. Podcasts B. Vlogs C. Blogs D. Newsgr
    14·1 answer
  • Although saying "Cylinder IS A Circle" doesn't make sense, it can be implemented in Java using inheritance in a legitimate way.
    9·1 answer
  • If you're looking to install Gigabit Ethernet, what cabling system would you use?
    9·1 answer
  • What does the Attack Time slider let you set?
    12·1 answer
  • The OnStar system allows Select one: a. a vehicle owner to initiate a conversation with an OnStar representative. b. the vehicle
    8·1 answer
  • 1. We want to add a button to the tally counter in Section 9.2 that allows an operator to undo an accidental button click. Provi
    8·1 answer
  • Hy plzz help me friends​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!