1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
8

A large amount of data is stored in secondary storage is it true​

Computers and Technology
2 answers:
Mice21 [21]3 years ago
6 0
Since it’s more cost efficient, it’s better to store more data in the secondary storage. Yes true!
zheka24 [161]3 years ago
3 0

A large amount of data is stored in secondary storage is true

You might be interested in
PHP Create a for loop that initialize with the variable $i = 10 The loop outputs $i as long as $i is greater than 1 using for lo
Tanzania [10]

Answer:

The PHP code is as follows

<?php

for ($i = 10; $i>1; $i--)

{

echo $i.' ';

}

?>

Explanation:

The code is self explanatory and doesn't require comments before it can easily understood.

The program starts with a php opening tag <?php

And it ends with the closing tag ?>

The interpretation of the question is to print integer values from 10 to 1

To do this, an iteration is needed.

The above program makes use of a for loop iteration.

Analysis;

for ( -> This shows that it is a for loop iteration

$i = 10; -> Iterating variable $i is initialized to 10 (that is; printing will start at 10)

$i>1; -> Iteration is valid while $i is greater than 1 (e.g. 2,3,4...10)

$i-- -> For every Iteration, decrease $i by 1

) -> End of Iterating condition

echo $i.' '; -> This line prints the valid values of $i. In this case, the values of $i is from 10 and stops at 2

The output is as follows

10 9 8 7 6 5 4 3 2

4 0
3 years ago
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
What is information technology ?​
ella [17]
Information technology can be defined as the study or use of systems for storing, retrieving, and sending information. Can be abbreviated to IT.
7 0
3 years ago
Read 2 more answers
In 1–2 sentences describe the purpose of comparison operators and give an example.
love history [14]
Comparison operators are used to compare between objects!
are they equal?  is one greater than the other?

if (a == b) ++a;
if (a > b) a = b;

for example when we use a sort function, comparison operators are used inside the function.

7 0
3 years ago
Amd relive how to download it says not fully installed help plz
Zinaida [17]
It is not fully installed because of storage or memory is not enough to install this app.

Hope this helps you :)



6 0
4 years ago
Other questions:
  • Assure that major, minor, sub1 and sub2 each contain four digit numbersIf less than four digits are entered in major OR minor OR
    5·1 answer
  • Wi-Fi is all around us. Is there any downside to its pervasiveness?
    11·1 answer
  • Match terms in the first column with the order descriptions in column two.
    11·1 answer
  • Select each item that represents what the Internet may be used for:
    9·1 answer
  • How to do this question , please answer quickly , I’ll give branliest
    14·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • Click this link to view O*NET’s Work Activities section for Manicurists and Pedicurists. Note that common activities are listed
    8·1 answer
  • Understanding that protection of sensitive unclassified information is:
    8·1 answer
  • The lost boy gave the correct
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!