1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
3 years ago
11

6. Which is not considered a storage device a. USB Flash Drive b. External hard Drive c. MS-Windows d. Internal Hard Drive e. Me

mory Cards​
Computers and Technology
1 answer:
Lana71 [14]3 years ago
6 0

Answer:

MS-Windows

Explanation:

MS-Windows is an operating system not a storage device.

You might be interested in
Which part of the computer coordinates all computer operations and performs arithmetic and logical operations on data
allochka39001 [22]

Answer:

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s.

5 0
3 years ago
Filmmakers must often establish information quickly in a film in order to give the audience context for the plot. In this film,
Dimas [21]
One thing evident about the two individuals is that Don and Lina are famous. The filmmaker, in the beginning uses the announcer to introduce them as "known all over the world." Another thing to note is that Don and Lina personified themselves a certain way to their fans. The announcer believed sincerely that they were courting. While the announcer played a huge part in giving the audience information that Don and Lina were courting, the filmmaker made sure that audience (crowd in the scene) played a vital part too. Once Don and Lina posed for a picture together, the crowd went wild. This implies that the audience believed that they were together.
8 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Which character is used to begin a comment?
Aloiza [94]
# is used to begin a comment.
8 0
3 years ago
Which of these is an application? Microsoft Windows Linux Microsoft Word Apple ios​
STALIN [3.7K]

Answer:

I think it's Microsoft windows

8 0
4 years ago
Read 2 more answers
Other questions:
  • Which expansion slot is used by an NVMe compliant device?
    9·1 answer
  • In addition to proposing that planetary orbits are elliptical, what other modification did Kepler make to Copernicus’s model? Pl
    15·2 answers
  • Which model represents scenarios thatchange over time?
    8·1 answer
  • In which step is a metaphor used in planning a multimedia presentation
    15·1 answer
  • If a triathlon is a sport combining three events, what do you think would be the word for a sport combining five events?
    7·1 answer
  • In the picture below
    10·1 answer
  • Before using an advanced filter, you must first set up a(n) ________.
    14·1 answer
  • True/false questions are useful in determining a student’s ability to____information
    8·1 answer
  • How to add if an statemement on a retrun in react js.
    14·1 answer
  • when inputting a formula into excel or other spreadsheet software, what components are required for the formula to function prop
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!