1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
15

Describe two types of storage devices?​

Computers and Technology
1 answer:
madreJ [45]3 years ago
8 0

Answer:

Central Process Unit and Random Access Memory

You might be interested in
Which of the following allows the transmission of voice and often video communication over the internet?
spin [16.1K]
Voice Over IP (VOIP) is the option that allows the transmission of voice and often video communication over the Internet.
So, this doesn't refer to mobile or other telephone communication, but rather to the Internet solely. Applications that are examples of this type of technology are Skype, Teamspeak, Ventrilo, and others. This technology is becoming better and better with each day and will probably replace phones completely in the future.
8 0
3 years ago
Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
AleksandrR [38]

Answer:

False

Explanation:

4 0
2 years ago
Read 2 more answers
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
Computer-aided design software is used by ________.
koban [17]

Answer:

by Architects?

Explanation:

not sure

6 0
3 years ago
To what extent are surrounded species able to stand the anthropogenic activities?
julsineya [31]

Answer:

At the current rate, surrounded animal species might not be able to stand anthropogenic activities in the nearest future.

Explanation:

<em>Anthropogenic activities are those human activities that causes change in the biophysical environment, ecosystems, biodiversity, and natural resources. It also includes global warming, mass extinction of animals and loss of bio-diversity and other global disasters brought about by human activities</em>.

<em>The main driving force of anthropogenic activities is the pressure brought about by the ever growing human population</em>. The earth is overpopulated by humans, and this pushes man to maximize his environment, even to the detriment of this environment. Animal species are hunted to extinction due to increasing demand for their meat, or ornaments gotten from these animals, or some of their body parts, perceived to hold medicinal power, industrial activities poison the environment and natural resources all around, and some ecology has been destroyed and native species population decimated, just because man felt he had to control his environment, sometimes by introducing foreign species he feels he needs.

If nothing is done to halt the current rate of anthropogenic activities, by controlling human population growth, man might end up occupying the planet all alone by himself with surrounding species utterly destroyed.

3 0
3 years ago
Other questions:
  • What is the name for the percentage of people who don't have jobs in a country or area?
    11·2 answers
  • What term identifies hard drives enclosed in a case other than your computer's case? A External hard drives B Flash drives C CD-
    8·2 answers
  • What is the name of the subsystem that transfers data between components inside a pc or between pcs?
    12·1 answer
  • A microphone is a type of electronic.<br><br> True/Faulse
    14·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • If the point (9, 5) is translated 6 units left and 5 units up, then find the
    10·1 answer
  • What are the examples of shareware?
    9·2 answers
  • A binary gap within a positive integer N is any maximal sequence of consecutive zeros that is surrounded by ones at both ends in
    13·1 answer
  • Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!