1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
14

How big was a 10MB disk drive?

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
5 0
10 megabytes or 10000 kilobyte
You might be interested in
The file descriptor stderr is represented by the number ____.
enyata [817]
Stderr is 2. stdin is 0, stdout is 1.
5 0
3 years ago
In the Happy Valley School System, children are classified by age as follows: less than 2, ineligible 2, toddler 3-5, early chil
sasho [114]

// C++ switch

// It can also be used for JAVA, C#

switch(age){

// here age will be sent by the function in which it is used

// case to check the age<2

case(age<2 && age>0):

// printing the line

cout<<"ineligible";

// case to check the age ==2

case(age==2):

// printing the line

cout<<"toddler";

// case to check 3-5

case(age>=3 && age<=5):

cout<<"early childhood";

// case to check 6-7

case(age==6 || age==7):

cout<<"young reader";

//case to check 8-10

case(age>=8 && age<=10):

cout<<"elementary";

// case to check 13

case(age==13):

cout<<"impossible";

//case tocheck 14-16

case(age>=14 && age<=16):

cout<<"high school";

// case to check 17 or 18

case(age==17 || age==18):

cout<<"scholar";

//case to check >18

case(age>18);

cout<<"ineligible";

// default case

default:

cout<<"Invalid age";

}

Read more on Brainly.com - brainly.com/question/12981906#readmore

5 0
3 years ago
Discuss the core technologies and provide examples of where they exist in society. Discuss how the core technologies are part of
Vika [28.1K]

Answer:

Part A

The core technologies are the technologies which make other technologies work or perform their desired tasks

Examples of core technologies and where they exist are;

Thermal technology, which is the technology involving the work production, storage, and transfer using heat energy, exists in our refrigerators, heat engine, and boilers

Electronic technology is the technology that involves the control of the flow of electrons in a circuit through rectification and amplification provided by active devices. Electronic technology can be located in a radio receiver, printed circuit boards (PCB), and mobile phone

Fluid technology is the use of fluid to transmit a force, provide mechanical advantage, and generate power. Fluid technologies can be found in brakes, automatic transmission systems, landing gears, servomechanisms, and pneumatic tools such as syringes

Part B

The core technologies are the subsystems within the larger systems that make the larger systems to work

The thermal technology in a refrigerator makes use of the transfer of heat from a cold region, inside the fridge, to region of higher temperature, by the  use of heat exchange and the properties of the coolant when subjected to different amount of compression and expansion

The electronic technologies make it possible to make portable electronic devises such as the mobile phones by the use miniaturized circuit boards that perform several functions and are integrated into a small piece of semiconductor material

Fluid technologies in landing gears provide reliable activation of the undercarriage at all times in almost all conditions such that the landing gears can be activated mechanically without the need for other source of energy

Explanation:

6 0
3 years ago
What is the purpose of a mail merge field?
goblinko [34]

Answer:

Mail Merge is a way to send the same message to a large number of persons, with each one properly addressed to a specific person.

Explanation:

8 0
3 years ago
Read 2 more answers
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
Andrei [34K]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

8 0
3 years ago
Other questions:
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees.
    13·1 answer
  • A computer program that senses when another computer is attempting to scan or access a computer or network is called an
    7·1 answer
  • How do you delete a slide from your presentation after selecting it
    8·1 answer
  • . Database connectivity software is also known as:
    11·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • 2ND LAST QUESTION
    13·1 answer
  • Impromptu speaking ability is very important in the workplace to clearly and effectively communicate ideas. An effective impromp
    8·2 answers
  • What java syntax allows me to take user input.
    11·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!