1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
7

Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive

Computers and Technology
2 answers:
Elis [28]3 years ago
6 0

Answer:USB drive

Magnetic storage

Optical drive

Explanation:

hope this helps

Vedmedyk [2.9K]3 years ago
6 0

Answer:

Optical drive

USB drive and

Magnetic storage

You might be interested in
If you want to copy text formatting from one area of your document to another area, _____. a. select the formatting you would li
Travka [436]

Answer:

I believe it is ‘A’

Explanation:

The Format Painter feature copies only the formatting from one selected text to another. The content and text of the selection will not be copied using Format Painter.

6 0
3 years ago
Scripting languages are distinguished by their ____ types.
vodomira [7]
I believe the answer is font.
3 0
3 years ago
// This class calculates a waitperson's tip as 15% of the bill public class DebugThree1 { public static void main(String args[])
DENIUS [597]

I added a decimal format to keep all decimals within the hundredths place. I also changed the calcTip method to void and the argument to a double. Void means the method doesn't return anything and changing bill to type double let's us pass numbers with decimals to the calcTip method. I hope this helps!

Download txt
4 0
3 years ago
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
3 years ago
If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
balandron [24]
You will type

400*2*1.5

1.5 is another way to say 1 1/2
4 0
3 years ago
Read 2 more answers
Other questions:
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • Can someone help me, please
    7·1 answer
  • When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if
    7·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • What is the best brand of folders
    13·2 answers
  • What is the use of jacquard loom
    13·2 answers
  • Give three reasons why you think Clip Art is so widely used in many different types of documents.
    13·2 answers
  • Edhesive 3.4 practice 1
    9·1 answer
  • Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which o
    10·2 answers
  • Please could you help me
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!