1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
10

when files on storage are scattered throughout different disks or different parts of a disk, what is it called

Computers and Technology
1 answer:
mestny [16]3 years ago
3 0

Answer:

File Fragmentation or Fragmented Files

You might be interested in
Which of the following is a basic principle of improvement?
lesya [120]

From the given the statement, "every system is perfectly designed to get the results it gets" is a basic principle of improvement.

Option B

<u>Explanation:</u>

The improvement activity begins with the quote ‘every system is perfectly designed to get the results it gets’, by W. Edwards Deming; The quote states both the unintended and intended effects are designed into our systems.

For example: Healthcare in the UK has been perfectly designed to lower the waiting times to 18 weeks for various procedures over last twelve years. Reflecting on Safer Patients Initiative (SPI), this can be true to improvement systems: every improvement system is perfectly designed to get the results its gets and SPI is a case in point.

The leading improvements that need to be designed into our improvement systems:

  • Improvement activity needs to be built on strong foundations
  • Greater engagement with people’s intrinsic motivation
  • Embrace a wider set of methods
  • Greater understanding of how systems and processes outside direct clinical care contribute to safety and quality.

So, it can be concluded that the line given by W. Edwards Deming tends to be the principle of improvement.

6 0
3 years ago
um I'm new and I just sign up like right now and brainly says I've reached my daily limit for my questions why?
Natalija [7]

Answer:

Im not sure why but maybe you can find a way to contact the people who own it and see if they know because that hasn't happened to me. How many questions have you asked

Explanation:

7 0
3 years ago
A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
Katena32 [7]

Answer:c

Explanation:

got it rii

3 0
3 years ago
Read 2 more answers
In preparing a works cited list, you should
sergeinik [125]
In preparing a works cited list, you should mlways follow MLA style. MLA style is the proper way to cite references<span> </span>
7 0
3 years ago
Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.
Kamila [148]

\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}

int y = (int) y;

int x = y;

<h2><u>Hope</u><u> </u><u>it</u><u> </u><u>helps</u><u>.</u><u>.</u><u>♪</u></h2>
7 0
2 years ago
Other questions:
  • Who<br> invented the term “debugging”?
    14·2 answers
  • What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT
    11·1 answer
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • This process can be applied to help workers choose the best telecommunications technology to do a specific task.
    6·2 answers
  • A resistor bank is connected to a controller with conductor insulation rated 75 °C. The resistors are not used in conjunction wi
    15·1 answer
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • Documenting Business Requirements helps developers control the scope of the system and prevents users from claiming that the new
    13·1 answer
  • What are the two basic classes of active directory objects?
    14·1 answer
  • A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
    6·1 answer
  • Tasks you can perform online include which of the following?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!