1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
4 years ago
11

Plz tell me a storage device that should be used for this and why

Computers and Technology
1 answer:
elixir [45]4 years ago
4 0
There are computer carts that you can plug computers in. they look like this. the may be cheap. our school uses them.

You might be interested in
Account numbers sometimes contain a check digit that is the result of a mathematical calculation. The inclusion of the digit in
marishachu [46]

Answer:

using System;

class CheckDigit

{

public static void Main (string[] args)

{ //Accepting value from user

Console.WriteLine ("Enter a four-digit account number");

int acc = Convert.ToInt32(Console.ReadLine());

int d=acc%10; //extracting the last digit

acc=acc/10; //having the first three digit

if(acc % 7 == d) //checking and displaying

Console.WriteLine ("Valid Account Number");

else

Console.WriteLine ("Invalid Account Number");

}

}

Explanation:

3 0
3 years ago
20 points fun challenge!!! Can u solve this challenge? Find the only spelled out word in this jumble of letters, there is only o
densk [106]

Answer:

hello

Explanation:

8 0
4 years ago
Read 2 more answers
Designations at the end of file names such as .docx and .html are called
Amanda [17]

Answer:

Designations at the end of file names such as .docx and .html are called. File extensions.

Explanation:

7 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
4 years ago
Read 2 more answers
The Federal Application for Student Aid (FAFSA) form:
alexandr402 [8]
Hey there

I believe the correct answer is (D) 


6 0
3 years ago
Other questions:
  • Ill give Brainliest!!!!! I REALLYYY NEED HELP
    14·2 answers
  • PLS ANSWER QUICK!!!!
    12·1 answer
  • Dave wants to host a website and he needs an operating system that is free of cost. Which operating system should he use?
    11·1 answer
  • Which of the following best describes the displayport interface used for connecting video monitors to computers
    11·1 answer
  • Write a program to prompt the user to enter a fist name, last name, student ID and GPA. Create a dictionary called Student1 with
    8·1 answer
  • What would be the greatest tool for emphasis? (video class)
    9·1 answer
  • Since nobody answered, I'm gonna just try this again. I really need help with this so please-
    15·1 answer
  • Debugging 2.17.3: Debug: The Two Towers Code Hs
    15·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    6·1 answer
  • Who are all the fnaf characters?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!