1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
2 years ago
15

. In this project, how many times will the [Drive] block be repeated?

Computers and Technology
1 answer:
Paul [167]2 years ago
5 0

Answer: wait is a multiple answers to it or

Because I think it’ll be forever

Explanation:

You might be interested in
Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
LenaWriter [7]

Answer:

The processor and the motherboard goes bad.

Explanation:

Computer system component upgrade allows the enhancement of the component specification. Every computer system comes with a specific quality, size or speed of its various components like the storage drives size, the memory size, the processor speed and even the software components like the operating system.

An upgrade must be compatible with the system configuration like upgrading the processor. If the upgrade is compatible, the processor speed can be increased, but when an upgrade of the processor is not compatible with the chipsets, this could damage the processor and motherboard.

3 0
3 years ago
What term refers to a written report given about an event or other newsworthy subject? A. press box B. press kit C. press pass D
guajiro [1.7K]
D. Press release is the correct answer. 
4 0
3 years ago
Read 2 more answers
Which statement will add a string to the string pool?
Alecsey [184]

Answer:

string newstring="hello"

7 0
1 year ago
a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public
expeople1 [14]

Answer:

The answer is "Blended Threat"

Explanation:

In the given question some information is missing that is the option of the question, which can be described as follows:

a. Firewalls.

b. Mirror disc.  

c. Threat from the backdoor.

d. blended threat.  

It includes bugs malicious content like malware, grubs, and many other scripts. It helps in remembering things when you combine multiple tasks in a processor to help learn, Its combination of stuff is produced, and other choices were false that can be described as follows:

  • In option a, It provides security to malicious, that's why it is wrong.
  • In option b, It is part of storage system, that's why it is incorrect.
  • In option c, It bypasses the normal security system, that's why it is wrong
8 0
3 years ago
Which method would you use to get the value associated with a specific key and remove that key-value pair from the dictionary
ollegr [7]

Answer:

popitem

items

pop

list

Explanation:

5 0
2 years ago
Other questions:
  • Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA
    5·1 answer
  • Sniffing network and wireless traffic, intercepting bluetooth traffic, and even using equipment to remotely pull information fro
    12·1 answer
  • give your opinion on if you would trust your accounts with an online bank. Explain why or why not. MANY people do not. MANY peop
    14·2 answers
  • What is the significant feature of computer capabilities?​
    14·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • What keyword is used in Java to create a parent/child relationship between two classes?
    14·1 answer
  • Which of the following is not a bus type A. Address bus B. Data bus C. Memory bus D. Control bus ​
    7·2 answers
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • A social media site violates its terms of service by selling information about its users
    7·1 answer
  • What is the device used for the calculations of payment and balancing the accounts record s​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!