1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
14

How big was a 10MB disk drive?

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
5 0
10 megabytes or 10000 kilobyte
You might be interested in
Which Windows installation method requires that you manually rename computers after the installation?​
levacccp [35]

Answer:

Command line

Explanation:

  • After installation of the machine one needs to manually rename the computer. This can be done through the start then settings, then system, and select rename the PC in the right-hand side column.
3 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Which of the following are screen objects used to maintain, view, and print data from a database
amid [387]

Answer:

The correct answer to the following question will be "A spreadsheet".

Explanation:

  • A spreadsheet is a software device used to access and stores data from such a database. The interaction between separate entities (in separate tables) is controlled by their specific columns.
  • It's a programming program for arranging, evaluating and storing data in tabular format.
  • The spreadsheets have been developed as computer-controlled analogs to paper reporting worksheets. The system runs on data decided to enter in table cells.

Therefore, a Spreadsheet is the right answer.

8 0
3 years ago
All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
Aliun [14]

Answer:

The code will be a java-script code

Explanation:

public abstract class Phone{

    private String phoneNumber ;

    public Phone  (String thePhoneNumber) {

        phoneNumber = thePhoneNumber ;

    }

    public  String getPhoneNumber ( ) {

        return phoneNumber ;

    }

public String toString (  ) {

    phoneNumber = "# (" + phoneNumber + ") " ;

    return phoneNumber ;

   }

public abstract boolean createConnection (Network status) ;

public abstract void closeConnection(  ) ;

}

6 0
3 years ago
Jan pays $70 each month for her auto insurance policy . The regular payment is called a
olga nikolaevna [1]
The amount paid regularly for insurance is called the premium.
3 0
4 years ago
Other questions:
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Select the statements that are true regarding the future of technology. Select 2 options.
    10·2 answers
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • There is the Iphone MAX, Iphone XR and Iphone XS. which iphone is the very NEWEST and which one do you recommend? explain.
    5·2 answers
  • An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems ana
    10·1 answer
  • How is the OR (||) logical operator used?<br> PLS HURRY
    11·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    10·2 answers
  • write a program that computes an integer's checksum. to compute the checksum, break the integer into its constituent
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!