1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
4 years ago
6

The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc

Computers and Technology
1 answer:
kodGreya [7K]4 years ago
7 0

Answer:

Hard Drive

Explanation:

hard drive (also known as the hard disk), is the primary storage device of a personal computer.

You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
Detecta 1 problema
Komok [63]

Answer:

En el factor secundario el problema es la contaminación ambiental y (o) polución.

Explanation:

No solo dentro de las industrias, si no que en todos lados...

Una manera de contrarrestar este problema es reducir el uso de recursos no renovables y utilizar los renovables. En forma de ahorro, los no renovables se podran producir un poco mas y podriamos mantener un buen ciclo de uso.

Espero te sirva!!

3 0
3 years ago
Read 2 more answers
Play among us with me
omeli [17]

Answer:

cool

Explanation:oof

8 0
3 years ago
Read 2 more answers
Which of the following tools is specifically designed to test the dc voltage on a hard disk drive
Leya [2.2K]

Answer:

A power supply tester is specifically designed to test DC voltage on most connectors coming from a PC power supply. A multimeter measures electrical properties such as voltage, amps, and resistance.

7 0
3 years ago
Janice usually works on a particular workbook that contains all business related data. She decides to keep a backup of all the d
quester [9]

The answer is to use the Ctrl and C keys on the keyboard to copy content from one workbook to another.

The Ctrl and C key is the standard combination keys on the keyboard that is used to copy any selected text or objects while in a user interface environment. Janice is required to press the C key while holding down the Ctrl key to copy all the content to the new workbook.

Another way of doing it is to make sure that both source and target workbooks are open. Navigate the sheets you want to copy or move in the source workbook. Click the Home tab and select then format dropdown in the Cells group. Select move or copy sheet option in the Organize sheet option. Choose the target workbook from the To Book dropdown and click OK.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Clip art, by default, is formatted as a(n) ____, which cannot be moved to a precise location on a page.
    14·1 answer
  • According to the Big Five Factors model, all but _____ are categories.
    11·1 answer
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • Once the data center routes to the destination server that hosts the website, whats the next step in the internet process?
    10·1 answer
  • Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
    15·1 answer
  • When was internet created in which year​
    13·2 answers
  • You need to install an operating system on a computer that will be sharing files for the company employees. You estimate there w
    9·1 answer
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
    5·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans..
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!