1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
5

Why is storage a pertinent component of any computer system?

Computers and Technology
1 answer:
gladu [14]3 years ago
8 0

Answer:

Storage is important because it needs to have a place to store data

Explanation:

You might be interested in
To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on th
Elenna [48]

Answer bobobobobobobobo

4 0
3 years ago
Your company has 1,000 users in a Microsoft Office 365 subscription. A Power BI administrator named Admin1 creates 20 dashboards
AysviL [449]

Answer:

Yes, it is.

Explanation:

Yes it will surely achieve the goal. When there is no license for user, then he/she will not access the dashboard.

7 0
3 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
If you receive an email message you suspect is spam, what should you do?
Alla [95]

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

6 0
4 years ago
Events and conditions that happen within an organization that are somewhat easier to deal with when responding to change are cal
IgorC [24]
These are called abstractions. They can be created by functions, if statements, or on event structures.
3 0
3 years ago
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • How do I type the integral symbol?
    7·2 answers
  • While you work on the customer’s printer, he continues chatting about his network and problems he’s been experiencing. One compl
    14·2 answers
  • Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
    11·1 answer
  • Various units used to measure computer memory
    13·1 answer
  • Can Anyone put my name in binary code using these images? Bentley is my name
    8·1 answer
  • Please help me with this , I’m stuck and cannot understand this , please help me with this , I’ll appreciate it alot
    13·1 answer
  • Provide TWO reasons to explain why humans and animals need clean wat​
    9·2 answers
  • What is a query? State it's uses.​
    8·1 answer
  • What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!