1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shutvik [7]
3 years ago
6

A drive is small enough to be carried in one's pocket.

Computers and Technology
1 answer:
hjlf3 years ago
4 0

Answer: Pen

Explanation:

You might be interested in
What is the purpose of linking text boxes?
Neko [114]
The answer that the person answered is the same answer I was gonna answer so Yh it’s correct
5 0
3 years ago
1. Write a 400-500 word research report about Burke High School.
fenix001 [56]

Answer:

when is it due

Explanation:

6 0
3 years ago
What are the six things you will learn this week on Scratch?
notka56 [123]

Answer:

1 You can learn to draw

2 You can learn to code

3 You can learn to make a thumbnail

4 You can learn how to follow yourself

5 You can learn  to remix your own projects

6 You can learn how to make a featured project you've never shared

Explanation:

8 0
3 years ago
Which situation best describes the prosumer effect?
elena-s [515]

C

Explanation:

https://www.sciencedirect.com/science/article/pii/S2405844019356750

8 0
4 years ago
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
Other questions:
  • How can you tell if a hacker has administrative access?
    15·2 answers
  • How are publishing used
    10·1 answer
  • In which scenario would someone want to use the Paste Link option?
    7·1 answer
  • Complete the sentence. <br><br> ____ Is the study and use of very small technology units
    14·1 answer
  • How is DATA sent across a Network?
    7·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?
    12·1 answer
  • Create a Python program to solve a simple payroll calculation. Calculate the amount of pay, given hours worked, and hourly rate.
    12·1 answer
  • 12. How many different documents can<br> you have open at one time?
    8·1 answer
  • What is a BUG in terms of computer programming?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!