1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
8

A hard disk is a ____ storage device. S A E N O Y R C D Unscramble the letters

Computers and Technology
1 answer:
nika2105 [10]3 years ago
5 0
The correct answer is secondary
You might be interested in
The value of a variable can change multiple times during the execution of a computer program.
ratelena [41]

Answer:

a. True

Explanation:

6 0
2 years ago
Please help!!!!<br> Data means only facts. <br> A. TRUE B. FALSE
vredina [299]
B false data does not only have to be facts
6 0
3 years ago
Which character goes at the end of a line of code that starts with if?
weqwewe [10]

Answer:

Explanation:

tttttttttttt

4 0
3 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
You would like to set up an online meeting to communicate with colleagues on a group project. Which of these tools should you us
sukhopar [10]
WordPress, really easy to use !
7 0
3 years ago
Other questions:
  • How to the inverse function of f(x)=x2 +1 ,x&gt;o
    5·1 answer
  • What type of memory can support quad, triple, and dual channels?
    5·1 answer
  • Represent the logic of a program that allows the user to enter a value for one edge of a cube. The program calculates the surfac
    10·1 answer
  • What is an important step to take before entering your first data into your database?
    10·2 answers
  • Knowing and understanding the targeted audience is a main compnent to creating a website
    15·1 answer
  • In cell K8, create a formula using the SUM function that calculates the total of the range D17:D20 and subtracts it from the val
    6·1 answer
  • What type of platform is Twitter?
    10·2 answers
  • Pls help I will give points
    11·1 answer
  • I need help fixing “Love Nikki” game on my phone. I had it on my phone and it worked just fine but then igot a new phone and tri
    8·1 answer
  • If you give someone ______ to your device, they can control it through another phone or computer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!