1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
2 years ago
6

Hard disk is a sequential data access medium. true or false?​

Computers and Technology
1 answer:
Crazy boy [7]2 years ago
3 0

My answer is TRUE

Explanation:

Hope it help!!

You might be interested in
60 POINTS!! WILL MARK BRAINLEST!!
polet [3.4K]

design of the network

security for the network

documentation

identifying and fixing issues

8 0
2 years ago
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
2 years ago
How many numbers can be represented with 2,3,4,8 bits?
MrRa [10]
Image that a bit is the smallest measure in programming, such as an elementary particle in physics. So, a bit can only fit one number.
5 0
2 years ago
What is the best anime of all time?​
Blizzard [7]

(My opinion)  Naruto! (then Boruto is on it's way to becoming good)

but other people might say my hero academia or any of the dragon ball saga

4 0
3 years ago
Using the =na() function in a cell, makes it clear that data is not _______ and hasn't been ______ accidentally.
inysia [295]
Show the cost to rent different items
5 0
3 years ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • What is the maximum amount that OSHA can impose as a penalty on an employer for each Willful violation?
    11·1 answer
  • 5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
    13·1 answer
  • Explain the role of the domain name system
    15·1 answer
  • An advertiser who sells coffee beans adds the keyword "Java'" to an ad group. After two weeks, she runs a placement performance
    11·1 answer
  • What UDP port is used by a default WDS server setup when it is listening for PXE boot requests​
    12·1 answer
  • Creating a chart using a spreadsheet Chart Wizard involves four steps. Which is the last step?
    6·1 answer
  • What are the consequences of plagiarism?
    7·2 answers
  • How do I do this??? (Im in 9th)
    7·1 answer
  • A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!