1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
7

Most cell phones and tablets have solid-state storage drives. internal hard disk drives. internal cloud storage. external hard d

isk drives.
Computers and Technology
1 answer:
Illusion [34]3 years ago
3 0

Answer:

internal hard disc drives

Explanation:

most common in mobile devices second is solid-state drives

help our cause by spreading this flag all over Brainly

You might be interested in
Question 8 of 25
denis23 [38]

Answer:

D to Protect sensitive data, Enterprise has certain security features and is mostly used in business settings.

5 0
2 years ago
During Which model states that communication can occur simultaneously?
SVETLANKA909090 [29]

Answer:

i dont see any models...please include a picture

8 0
3 years ago
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
The
saveliy_v [14]
The answer is Undo I think
4 0
3 years ago
Read 2 more answers
Which of these are steps in the testing cycle? Check all of the boxes that apply.
ollegr [7]

Answer:

A,C and D

Explanation: You're welcome

5 0
3 years ago
Read 2 more answers
Other questions:
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • When i click a link the page doesn't pop up HELP THE TOMATO
    9·1 answer
  • Build a state diagram for the “book” based upon the following information of the library.
    6·1 answer
  • Answer if you play PS4 apex legends if you do answer username and first to answer is brainliest
    15·2 answers
  • ______ is data that is entered into a computer. ______ is the result produced by a computer.
    6·1 answer
  • What animal does maleficent transform into in order to defeat prince phillip?
    13·2 answers
  • So whenever I play among us, I always get killed. Like always. I want to know some Technics to being a crew mate and an impostor
    9·1 answer
  • What is the widest area network?
    15·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • Watch any film of the silent era. Choose a short film from any genre that is less than 30 minutes long. Write a review of your e
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!