1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
3 years ago
7

We can save our data peremently on a

Computers and Technology
2 answers:
ivanzaharov [21]3 years ago
6 0
Answer: A hard disk
Explanation: It is much like a flash drive with larger storage space


Hope this helps
riadik2000 [5.3K]3 years ago
4 0

Answer:

modem

Explanation:

hope it helps

You might be interested in
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
To enter data in a cell, you must first select the ____.
slavikrds [6]
To enter data in a cell, you must first select the cell.
3 0
4 years ago
Why does the PC send out a broadcast ARP prior to sending the first ping request
Norma-Jean [14]

Since the ARP broadcast is utilized to request the MAC address of the Host with the IP address contained in the ARP, the PC needs to know the destination of MAC address before it can produce the frame header for the particular PING requested, before it can send a PING to a host.

5 0
3 years ago
Why do we need to shutdown our computer unit before we clean and disassemble?
Len [333]
Silly question! Of course you have to shutdown because you can ruin some components. Also you can block the CPU fan, CPU is very hot like the computer internals.
3 0
4 years ago
What is number system​
schepotkina [342]

<u>★ Defination:</u>

The number system or the numeral system is the system of naming or representing numbers. The number system helps to represent numbers in a small symbol set.

<u>★ Tips:</u>

The value of any digit in a number can be determined by:

• The digit

• Its position in the number

• The base of the number system

<u>★ Types of number system:</u>

There are various types of number system in mathematics. The four most common number system types are:

• Decimal number system (Base- 10)

• Binary number system (Base- 2)

• Octal number system (Base-8)

• Hexadecimal number system (Base- 16)

8 0
3 years ago
Other questions:
  • What should you do if a dialog box covers an area of the screen that you need to see?
    10·2 answers
  • Sql statements that define the objects such as tables, indexes, triggers, etc. in a database are referred to as _______________
    7·1 answer
  • How many occupational groups are there in the SOC system?
    12·1 answer
  • A Linux-based OS is called a _____.
    9·1 answer
  • You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLA
    15·1 answer
  • People who rely on others for financial support, such as children and the elderly, are referred to as 16 O A. recipients O B. be
    9·1 answer
  • Select the correct answer.
    11·2 answers
  • The _____ feature enables you to represent text as colorful visuals.
    15·1 answer
  • List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will
    8·1 answer
  • the implications your organization of providing email facilities to individuals in the workplace in terms of security and virus
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!