1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
3 years ago
11

Plz tell me a storage device that should be used for this and why

Computers and Technology
1 answer:
elixir [45]3 years ago
4 0
There are computer carts that you can plug computers in. they look like this. the may be cheap. our school uses them.

You might be interested in
PLEASE HELP
kap26 [50]

Answer:

dog

Explanation:

The python program has four lists, A, B, C, and E which is a list of the first three lists. Lists are unordered indexed data structures, it is accessed by an index starting from 0 to n (which is the length of the list minus one).

The E list is a list of lists with three list items starting from index zero to two. E[0][1] is used to access the item "dog" in the first list item of the E list.

3 0
3 years ago
MOA115 Medical Records and Insurance
Kay [80]

Based on the information given about the insurance, it should be noted that there's a difference between the covered and charged amount.

<h3>What is an insurance?</h3>

From the complete question, an insurance means a policy where an individual is entitled to financial protection.

In this case, there's a difference between the covered andd charged amount. Also, based on the table, the amount that Yan will be responsible for is 12.17.

Learn more about insurance on:

brainly.com/question/25855858

6 0
2 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
2 years ago
Why is it important to follow a consistent naming convention for variables?
Vitek1552 [10]

Answer:

today I am going to be out for the job interview so if I will make it happen I am going to New Orleans this week to get the kids to work on the spot and I can get ready to go out to dinner and I can make a few more people

4 0
2 years ago
You have successfully compiled the file Hi.java, how do you run the corresponding program from the command line?
n200080 [17]
The answer is b. java Hi.class :)
8 0
3 years ago
Other questions:
  • What is the biggest disadvantage of copying a worksheet into another workbook?
    13·1 answer
  • What is the unique impact him professionals have on coded data?
    11·1 answer
  • Having a good credit score is important because:
    7·1 answer
  • A(n) ____________________ is a set of programs that coordinates all the activities among computer or mobile device hardware.
    10·1 answer
  • Is spread spectrum transmission done for security reasons in commercial WLANs?
    13·1 answer
  • Who ever likes Pokemon an wants to help me please comment and I will Give the room for My Assignment
    9·1 answer
  • Which location-sharing service offers items for users as a gaming component and also allows them to collectively link their chec
    9·2 answers
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • What are 25 items that trees made?
    6·2 answers
  • which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!