1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
12

What is the 3 different storage requirements a computer has to process data​

Computers and Technology
1 answer:
charle [14.2K]3 years ago
7 0

Answer:There are three main types of data storage on the market: cloud-based, server-based (also known as hyper-convergence), and traditional

Explanation:

You might be interested in
What an underlined word or phrase represents? (HTML AND CSS), has to be 9 letters long. kinda urgent
xz_007 [3.2K]

Answer:

hyperlink

Explanation:

Hyperlinks render as underlined by default, so that's my guess.

7 0
3 years ago
When was the phone Built
quester [9]
The first phone was made in 1854 by <span>Antonio Meucci.

Other inventors like </span>Johann Philipp Reis, <span>Alexander Graham Bell, Elisha Gray, and Thomas Edison reinvented the telephone or enhanced it.</span>
3 0
3 years ago
Read 2 more answers
Question #5
Anestetic [448]

Answer:

d;  attribute

Explanation:

8 0
3 years ago
Read 2 more answers
What’s unique about New Cashierless stores?
Anettt [7]
There’s no cashiers, meaning if you need help you got to figure it out alone.
7 0
3 years ago
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
Other questions:
  • 3) According to the five-component model of information systems, the ________ component functions as instructions for the people
    8·1 answer
  • A computer program that senses when another computer is attempting to scan or access a computer or network is called an
    7·1 answer
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • What test is most similar to binary​
    9·1 answer
  • Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.
    5·1 answer
  • business information management professionals also perform duties of _ information system professionals
    11·1 answer
  • How to unsubscribe from Brainly
    6·2 answers
  • With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have othe
    6·1 answer
  • Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
    10·1 answer
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!