1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
2 years ago
11

A hardware component that keeps data and information when the device is not powered is called a ____ device.

Computers and Technology
1 answer:
serious [3.7K]2 years ago
5 0

It should be noted that the hardware component that keeps data and information when the device is not powered is called a storage device.

This device can be permanent or temporary storage device.

<h3>What is a storage device?</h3>

Storage device can be regarded as the device that store data.

There are different storage devices for the computer system, they includes;

  • Optical Storage Devices.
  • External HDDs
  • Random Access Memory
  • Flash memory devices.
  • Floppy Disks.

Learn more about storage device at ;

brainly.com/question/21283135

You might be interested in
How do you represent (decimal) integer 50 in binary
il63 [147K]
Its 110010. i hope this helped
7 0
3 years ago
8. What is the order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N
velikii [3]

The order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N is; O(1)

<h3>Understanding Computer Programming Language</h3>

Let Top be the position of last element inserted in Array.

For Push operation, the process is as follows;

if(Top == last index of Array) {

Printf(“Stack Overflow”)

} else {

Top = Top + 1

a[Top] = element you want to insert

}

Read more about Computer Programming at; brainly.com/question/22654163

8 0
2 years ago
How much are the prelab, inlab, and postlab parts worth?prelab:% inlab:%postlab%
Semmy [17]

Each lab consists of a PreLab, InLab, and a PostLab. PreLabs are worth 20%, InLab 50%, and PostLabs 30% of the final lab grade. the fifth submission is worth 40%.

<h3>What is prelab?</h3>
  • Pre-lab assignments are tasks or homework that students complete before arriving in class for the lab period.
  • Pre-lab assignments motivate students to prepare for the lab and help them connect conceptual understanding with an experiment.
<h3>What is inlab?</h3>
  • With inLab CAD Software, you design digital dentures and partial frameworks as well as splints, impression trays, and telescopes.
<h3>What is postlab?</h3>
  • Postlab is a Mac app that lets you collaborate on Final Cut Pro X libraries and Premiere Pro projects.
  • Postlab enables editors to share files, track and save changes, and make sure no more than one person is working on the same library or project simultaneously.

To learn more about it, refer

to brainly.com/question/22654163

#SPJ4

5 0
1 year ago
For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addres
Shkiper50 [21]

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

8 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
Other questions:
  • The =COUNT function calculates what value?
    5·2 answers
  • Casey Griggs is a very capable computer engineer. Recently, he noticed a problem that computer engineers have, and thought of a
    13·1 answer
  • 2 inventions revolutionized photography, what are they?
    10·1 answer
  • John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows his to access
    5·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    15·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • What do u think a creative app must have? <br><br> Please answer the question ASAP!!
    5·1 answer
  • Which of the following is referred to as "keeping up with the Joneses"?
    13·1 answer
  • 5.23 LAB: Contains the character
    8·1 answer
  • How does 5G technology enhance the Internet of Things (IoT)?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!