1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
2 years ago
13

Whatarethe features of secondary storage media​

Computers and Technology
2 answers:
asambeis [7]2 years ago
7 0

Non-volatile, known as flash memory, auxiliary storage

Tems11 [23]2 years ago
3 0

Answer:

Secondary storage is a non-volatile memory, which has the capability to hold data until and unless it has either been deleted or overwritten. It is also known as auxiliary storage, external memory, flash memory, and secondary memory. It must be noted that the prime function of the secondary storage is to compliment the primary storage. Besides that, it is also used as a backup storage medium just like cloud storage to protect from data loss due to computer malfunction, cyber-attack or any other tragedy. Generally, secondary storage technology is about two orders of magnitude cheaper than the primary storage.

Explanation:

You might be interested in
In the context of organizational decisions at the tactical management level, _____ decisions are often used in resolving conflic
natali 33 [55]

Answer:

b. structured

Explanation:

Based on the information being described within the question it can be said that the type of decisions being mentioned are known as structured decisions. These are decisions which have various processes in place in order to handle a certain situation. Usually due to the problem having occurred countless times and are predictable.

4 0
3 years ago
What is the main idea of this article? Please someone help me. I will give brainliest answer
mart [117]
The main idea of this article is that theme parks are conducting scientific research that is benefiting the community. Hope this helps!
8 0
3 years ago
Is technology science? I mean, I think it is... uh, why am I so paranoid about this project.
STALIN [3.7K]

Answer:

i ..d..k do something ez

Explanation:

5 0
3 years ago
Read 2 more answers
When a business is using methods that help it use its time and resources the best they can, what are they exercising?
maria [59]
<span>B. Efficiency

(</span><span>effective training </span><span>techniques)</span>
3 0
3 years ago
Read 2 more answers
Step 1: Configure the initial settings on R1. Note: If you have difficulty remembering the commands, refer to the content for th
Andru [333]

Answer:

The configuration of the R1 is as follows

Explanation:

Router>enable

Router#show running-config

Router#show startup-config

Router#configure terminal

Router(config)#hostname R1

R1(config)#line console 0

R1(config-line)#password letmein

R1(config-line)#login

R1(config-line)#exit

R1(config)#enable password cisco

R1(config)#enable secret itsasecret

R1(config)#service password-encryption

R1(config)#banner motd #Unauthorized access is strictly prohibited#

R1(config)#end

R1#exit

R1>enable

R1#copy running-config startup-config

R1#show flash

R1#copy startup-config flash

3 0
2 years ago
Other questions:
  • Hub is used in Twisted pair Ethernet. True/False
    6·1 answer
  • You have to communicate a signal in a language that has 3 symbols A, B and C. The probability of observing A is 50% while that o
    11·1 answer
  • 9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
    6·1 answer
  • WILL UPVOTE NEED ANSWERS ASAP i have till 4:30
    12·1 answer
  • In order to achieve a win-win solution, all parties involved should negotiate a solution. True or False ?
    13·2 answers
  • What are the elements of an autobiographical narrative similar to those of a short story?
    7·1 answer
  • According the Keown book, which Web-based personal financial planning website is known as "the best free way to manage your mone
    6·1 answer
  • Drag each tile to the correct box.
    11·1 answer
  • Which actions are available in the Trust Center? Check all that apply.
    8·1 answer
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!