1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
13

What is the generic term for a device that stores images for long periods of time?

Computers and Technology
2 answers:
Artemon [7]3 years ago
7 0
I would say 1. Backup drive.
Olenka [21]3 years ago
6 0
The answer is 1.Backup drive
You might be interested in
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are
lions [1.4K]

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

4 0
3 years ago
Content controls cannot be removed, only edited. Please select the best answer from the choices provided
Anton [14]
 False is your answer
5 0
3 years ago
Please helpppp me!! thank youuu :)
Usimov [2.4K]

Answer:

3?

Explanation:

3 0
3 years ago
A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus s
IceJOKER [234]

Answer:

The answer is "Option A"

Explanation:

Escalation is the process of manipulating a bug, design failure in software program to obtain elevated access to the resources, which are usually shielded from the user, and wrong choices can be described as follows:

  • In option B, It is wrong because It can't provide any type of problem-solving.
  • In option C, It is wrong because it is a searching module.
  • In option D, It is wrong because it is used to verify the system.
6 0
3 years ago
Other questions:
  • 125 • 12² what is the answer?<br>- 124​
    6·1 answer
  • You have an interface on a router with the IP address of 192.168.192.10 /29. What is the broadcast address the hosts will use on
    15·1 answer
  • PLS ANSWER QUICK!!!!
    12·1 answer
  • In Microsoft word when you highlight existing text you want to replace , you're in?
    15·1 answer
  • Write a user written function that expects as its input argument a vector of x values and a vector of corresponding y-values. Th
    15·1 answer
  • Which of the following characterizes how an enabled security program might react to a new program installation on a computer sys
    7·2 answers
  • What is computer and example<br>​
    5·1 answer
  • Spark is electrical discharge in air, while air is mix of variety of gases what particles conduct electricity in gas
    12·1 answer
  • #Question 4: #Use a variable to represent the name of a food. You are then going to print this variable four times. Before you d
    6·1 answer
  • There are three groups of people, people who like Apples, Bananas, and Cherries. 19 people like Apples. 23 people like Bananas.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!