1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
12

What is the 3 different storage requirements a computer has to process data​

Computers and Technology
1 answer:
charle [14.2K]3 years ago
7 0

Answer:There are three main types of data storage on the market: cloud-based, server-based (also known as hyper-convergence), and traditional

Explanation:

You might be interested in
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
4 years ago
How to enter date in a Date/Time field?​
NikAS [45]

Answer:

Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.

Explanation:

3 0
3 years ago
Which musical instrument would have the lowest pitch ?
Oduvanchick [21]

Answer: subcontrabass  tuba, then octocontra bass clarinet, then organ.

Explanation:

8 0
3 years ago
What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
Oliga [24]

I Am Pretty Sure The Answer Is - "B"

Hope This Help's

5 0
3 years ago
1. Why does a computer have different types of ports?
iren2701 [21]

Answer:

Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • â________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
    15·1 answer
  • How do Hlookup and Vlookup differ?
    5·2 answers
  • When creating a mail merge, you must insert all of the items from your data source into your merged document. Truth or false ?
    6·2 answers
  • Which files have not been processed by your camera or computer?
    13·1 answer
  • Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
    7·1 answer
  • ________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf
    11·1 answer
  • Which task should happen during the planning stage of a project? reflect on the project outcomes prevent set-backs determine the
    11·1 answer
  • Write down the reciprocal of 40​
    12·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
  • 1. A cell is identified by its ........
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!