1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
2 years ago
14

4. The hard drive is a long-term storage, which means the data is still saved even if you turn the computer off or unplug it. Tr

ue False​
Computers and Technology
1 answer:
alina1380 [7]2 years ago
6 0

Answer:

True

Explanation:

A hard drive doesn´t wipe itself after a certain amount of time like RAM does. The data you store on it will stay there until the hard drive is either destroyed, or you delete to the data yourself.

You might be interested in
How many responses does a computer expect to receive when it broadcasts an ARP request?why?
Alla [95]

Answer: The response that is expected when it broadcast an ARP request is one or zero.

Explanation: ARP request means Address Resolution Protocol which is a protocol responsible for the mapping of the IP(Internet protocol)address of a system to the MAC(Media Access Control) layer. Only one response is received only if the IP address is present in the ARP otherwise if the IP address does not matches then no response is returned.Thus only one or zero response can be received when a ARP request is process.

5 0
3 years ago
Who knows a website that can connect videos in your phone
Arte-miy333 [17]
Get a screen recorder then record all the videos u wanna save then u can go back and watch them wenever u want to
5 0
3 years ago
________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
erastovalidia [21]

Answer: MDM softwares

Explanation:

Here MDM refers to mobile device management software which provides people with the facilities of updating, installing creating backup of various mobile devices within an organisation. Moreover these software's provides tools for proper monitoring and to report their usage across various independent mobile device users. MDM is often used or interconnected with the term BYOD(Bring your own device), whereby employees of an organisation bring their own mobile devices and they are being managed by a MDM software centrally.

8 0
3 years ago
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
MA_775_DIABLO [31]

In excel spreadsheets, Sidney need to consider specifying relationships between the information you have stored in your spreadsheets when creating formulas. The elements that will help you understand using spreadsheet are the constants, operators, references and functions. This will enable her to use the formulas, without hassle in spreadsheets.

3 0
3 years ago
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
3 years ago
Other questions:
  • What is the role of programmers in an organization?
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • Python provides a special version of a decision structure known as the ________ statement, which makes the logic of the nested d
    13·1 answer
  • Ile 1 cm<br> ?<br> 50 m<br> The an
    5·2 answers
  • Your windows system is used by several people, so you want increase security by requiring users to create passwords that are at
    9·1 answer
  • Please answer the following essay question:
    13·1 answer
  • What is required to become a good critical thinker? Use a process when dealing with a big issue. Practice the right skills over
    9·1 answer
  • Difference between electrical and electronic devices
    15·2 answers
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!