1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
13

What is the name of the arm that is attached to the read/write head?

Computers and Technology
1 answer:
lawyer [7]3 years ago
7 0
This is not making sense?
You might be interested in
Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing
nataly862011 [7]
For bad software, probably a virus/malware/ransomware kind of thing. If it is good software, probably a program that organizes your files, adjusts certain things, but do not record your files (no programs are at the top of my head, sorry).
4 0
3 years ago
Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a
mestny [16]

Answer:

START LOOP FOR EACH EMPLOYEE:

   INPUT employee’s name, hourly rate of pay, number of hours worked, overtime pay rate, payroll deductions, tax rate

   SET gross pay = (hourly rate of pay x *weekly hours) + (overtime pay rate x (number of hours worked - *weekly hours))

   PRINT gross pay

   SET net pay = gross pay - (payroll deductions + (gross pay * tax rate/100 ))

   PRINT net pay

END LOOP

* weekly hours (how many hours an employee needs to work to earn overtime pay rate) is not given in the question

Explanation:

Create a loop that iterates for each employee

Inside the loop, ask for name, hourly rate, number of hours worked, overtime pay rate, payroll deductions, tax rate. Calculate the gross pay and print it. Calculate the net pay and print it

8 0
3 years ago
A) Write a class Card. A Card has the following private attributes:
Over [174]

Answer:

Java.

Explanation:

public class Card

{

   String Suit;

   int value;

   public Card(int value, String Suit) {

       self.value = value;

       // Check Suits value

       if ((Suit == "hearts") || (Suit == "spades") || (Suit == "clubs") || (Suit == "diamonds"))

           self.Suit = Suit;

       else {

           Suit = "none";

           throw new IllegalArgumentException("no card of this type exists.");  

        }

   }

   public String getSuit() {

       return Suit;

   }

   public int getValue() {

       return value;

   }

 

   public void print() {

       System.out.println("%d of %s", value, Suit);

   }

}

public class Deck {

}

6 0
3 years ago
Enumeration can be used to discover all but which of the following types of information?
Ostrovityanka [42]

Answer:A)Smart-card PINs

Explanation: A pin is the defines as the personal identification number that is allotted to the smart card uniquely that is no other smart can have same number.This number is only known by the smart card holder only.

This number is important because it works for the unlocking of the data that is securely stored and by entering the pin ,it can be decoded.Thus, the other given options are incorrect because they don't use enumeration to hide the data .Thus the correct option is option (A)

3 0
3 years ago
Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b.
Assoli18 [71]

Information should be cross-checked to ensure more than one source provides the same factual information.

<h3>What is the source of information?</h3>

The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.

The options given in the problem regarding the information as,

  • a. repeated
  • b. cross-examined
  • c. cross-lined
  • d. cross-checked

There are many feck news and nonfactual data is present over the internet and other source of information.

To get the factual information, one should always cross-checked the information from other sources.

Thus, the information should be cross-checked to ensure more than one source provides the same factual information.

Learn more about the source of information here;

brainly.com/question/26169752

7 0
2 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • SOMONE TELL ME THERE ROBLOX USER NAME AND DO U PLAY IT!!!!! MINE IS Borutouzimaki2133
    9·2 answers
  • How old is the oldest asian
    14·2 answers
  • (I'LL GIVE BRAINLIST)
    10·2 answers
  • Which of the following is true of two-factor authentication?
    13·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • In a @return tag statement the description:
    13·2 answers
  • A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
    10·1 answer
  • Is an automatic computer check to ensure that the data entered is sensible and reasonable.It does not check the accuracy of data
    7·1 answer
  • Helpppppp me please cuz its due rn. put the correct word in the correct spot
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!