1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
9

Describe how serial data access finds data

Computers and Technology
2 answers:
meriva3 years ago
5 0

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)

jeyben [28]3 years ago
4 0

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

You might be interested in
Which of the following is not true about managing your privacy settings? (select all that apply)
Evgesh-ka [11]
I'm going with 
<span>The things that you post online become public information.
and
</span><span>Employers screen job candidates based on social medias.

Because when you post online, you can very easily make your account private, or only share the post to a specified group of people.

Employers also screen job candidates based on their backround, personality, etc.</span>
4 0
4 years ago
Read 2 more answers
1. Perform the following Binary Additions 101101 + 10100 *
USPshnik [31]

Answer:

1.         carry   1  1  1

                      1  0 1 1 0 1

                      +  1 0 1 0 0

                       ------------------------

   Answer: 1  0 0 0  0 0 1  

2.         carry  1 1  1 0 1  1  

                     0 1 0 1 0 0 1 1

                  + 0 1 1  1 0  1  1 0

                  --------------------------

    Answer: 0 1  1 0 0 1 0 0 1

3.                   1 0 1 1 0 1

                    -   1 0 1 0 0

                   -------------------------

       Answer: 0 1 1 0 0 1

4.                      1 1 0 0 1 0 1 1

                      -    1 0 1 0 1 1 0

                     -----------------------------

        Answer:   01 1 1 0 1 0 1

Explanation:

In Binary addition when you add 1 + 1 = 0, carry over the 1, i.e 10

in Subtraction when you subtract 0-1 = 1,  brow 1 from left side, resulting in -1 carried over.

3 0
3 years ago
Read 2 more answers
Define the term<br>cyber culture​
PolarNik [594]

Answer:

The social conditions brought about by the widespread use of computer networks for communication, entertainment, and business.

Hope This Helps!!!!

Explanation:

8 0
3 years ago
HELP!' Prompt<br> In a table, what is a field?
ser-zykov [4K]

Answer:

Fields are the components that provide structure for a table. In fact, you can't have a table without fields. ... Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

3 0
3 years ago
What countermeasures would you recommend to defend against routing attacks?
Alla [95]

Answer:

 The countermeasure is basically recommended against the attackers for defending various routing attacks. Routing is one of the most generally assaulted segments in a system and a lot of system the executives work centers around checking conduct of switches.

The single router has more than one unit for bundle handling. This encourages quicker handling. This preparing unit is finished programming which can be undermined by an aggressor.

So an additional free equipment is implanted into the switch which can do observing to recognize the product assaults. Maintain a strategic distance from over composition the addresses.

Be movement at time when all of a sudden if anything incorrectly happens we should be in a situation to deal with and deal with the issue since it causes more harm when time runs.

3 0
3 years ago
Other questions:
  • What range of leakage current must trip an IDCI?​
    15·1 answer
  • What is constructive criticism?
    5·1 answer
  • Programmers compile a list of instructions to build their applications. These instructions are typically grouped into units of c
    10·1 answer
  • To display a pop-up form for a control, such as account number in a datasheet create a user interface (UI) macro that is associa
    12·1 answer
  • Advantages of heading attributes
    5·1 answer
  • What table element represents a field within a record in powerpoint A column B Row C header D footer
    14·1 answer
  • Which position most likely requires your Master's Degree for success
    7·1 answer
  • A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following would represent
    9·1 answer
  • _ is a term used for license like those issues by creative commons license as an alternative to copyright
    8·1 answer
  • Hlo Brainlians !!
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!