What are the two most common kinds of hard drives?
open source and proprietary
O terabyte and gigabyte
O RAM and ROM
O magnetic hard disk drive and solid state drive

Answers

Answer 1
The last option:
Magnetic hard disk drive & solid state drive (HDD) & (SSD)

Related Questions

1. (1001010)2 – (10100)2 perform.​

Answers

Given:

[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]

To find:

value=?

Solution:

[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]

In this first, we convert the given binary number to the decimal number:

Converting [tex]\bold{(1001010)_2}:[/tex]

[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]

Converting [tex]\bold{(10100)_2}:[/tex]

[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]

Subtracting the value:

[tex]\to \bold{74-20=54}[/tex]

After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]

So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"

Learn more:

brainly.com/question/23729089

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

how is computer in each generation distinguished from each other​

Answers

Answer:

By the electrical current flowing through the processing mechanismsWhy do scientist believe the storm is so severe.

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies.

Explanation:

[tex]\sf{}[/tex]

♛┈⛧┈┈•༶♛┈⛧┈┈•༶

xd ... ;)

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

what is text or picture behiind the document called ?​

Answers

Attachment
It’s called an attachment

Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security

Answers

Answer:

Answer:education and training- speech Language pathologist And curriculum developer

Government and public administration- tax auditor and federal aid coordinator

Law, public safety corrections and security- attorney and paralegal

Explanation:

Write a short note on the fifth generation computer​

Answers

Answer:

It's component is bio chips.

It is used in present-future.

I think operating speed is Mili second.

Which engineer may design a GPS for a vehicle?

Answers

Explanation:

Mechanical engineer may design a gps for a vehicle.

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

. Many Shakespeare plays deal with the idea of fate andior free will. Is fate something that
can be altered or is it predetermined? Is there such a thing as free will?


Pls help

Answers

Answer:

Love cools, friendship falls off, brothers divide: in cities, mutinies; in countries, discord; in palaces, treason; and the bond cracked between son and father" (1.2.58). Later, after Gloucester's enemies blind him and cast him into the wilds, Gloucester says to the loyal old servant attending him, “As flies to wanton boys, are we to the gods.

Explanation:

Answer:

it depends

Explanation:

if you think about it it free will and fate are connected, like gears, if you turn the first cog that is free will, you can set of a chain reaction of other cogs and wheels that ultimately determine the outcome which is fate, but fate can be altered by the choices you make and all that matters is the first cog

Explain ONE negative outcomes of not matching an ICT product to the correct audience:
PLEASE HELP

Answers

Can't read fonts:
- If your audience is older and have poor eyesight, standard size fonts and poor colour schemes can make it difficult to read
No Attraction:
- If you had a website for a child and it had lots of text and not a lot of colour or pictures
Not interesting enough:
- The content of the product is not interesting
Can't use product:
- If it is complex and requires alot of typing or uses a lot of buttons, it would be too difficult for a child to use

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

I need help with my computer, I did a network reset because my wifi was acting up and I was told to do so, but now I can't connect to any network

Answers

Answer:

Turn off your netork, restart your computer and turn on the network back again,

if that doesn't works, try contacting a technician

Answer:

The best solution is to uninstall the network adapter's driver and allow Windows to reinstall it automatically. ... Press Windows key + X and click on Device Manager. Right-click on the network adapter and choose Uninstall. If prompted, click on Delete the driver software for this device.

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible

Answers

Answer:

648

Explanation:

---

Conditions: Not allowed to start with 0 // No repeating digits

---

9 possible ways for first digit (excluding 0, therefore 1-9)

e.g. 123, 234, 567

9 possible ways for second digit (excluding 0 and digit before 1-9)

e.g. 123, 124, 125

8 possible ways for third digit (excluding 0 and condition for second digit 1-9)

e.g. 789 is legit, but 788 is not

Multiply 9*9*8 to get an answer of 648

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

what is the full form of XML?​

Answers

Answer:

extensible markup language

XML is “extensible markup language”

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

Mark true or false IT questions

1:you can change the default font style in word ( )

2:A pie chart represent only one data series ( )

3:MS-DOS is a graphical user interface operating system ( )

4:a presentation software is a application software ( )

5: only addition can be done in the ALU ( )

fill in the blanks...............

1:A ................... mouse is looking like a pencil

2:A/An ......................... is an interface between the user and the computer​

underline the correct answer

1: the.......... function multiple the numbers in Excel

add

sum

products

Min

2:to enter the data in multiple lines

wrap text

merge and center

orientation

all of these

3:a list is used when the unordered of items is marked

bulleted

numbered

both a and b

non of these

4:the screen that you see after you signed in the computer

wallpaper

desktop

screen saver

non of these

5:the ............. manages the working and control of a network device

Device driver

kernel

file system

all of these

Answers

Answer:

1. true

2. true

3. false

4. false

5. false

2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false​

Answers

Answer:

I think it is false bcz the set of instruction given to computer is program.

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

A program virus infect​

Answers

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements is called: A. participatory design. B. joint application design (JAD). C. prototyping. D. whiteboarding. E. rapid application development (RAD).

Answers

Answer:

B

Explanation:

joint application design (JAD)

I'm really weak at computers can someone please help me with these questions ​

Answers

Answer:

DIM count, number, previous, temp AS INTEGER

 count = 0

 number = 1

 previous = 1

again:

 count = count + 1

 temp = number

 number = number + previous

 previous = temp

 PRINT number

 IF count < 10 THEN

    GOTO again

 END IF

Explanation:

Here is the code for the first assignment. Can you think about the rest indicate where you get stuck?

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

Explain why this product was created?

Answers

Explanation:

Product was created becaus the first and most important reason for any new development is to provide new value to the customer. Without this, there is no reason for them to trade their money for the new device. However, if the product or service offers overwhelming value, then customers will flock to it.

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

Can i have the answer of that fill in the blanks

Answers

Answer:

c) {n/a}

d)Binary codes

e)NLP

f)Application software

So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a hacker or something wronging with the computer (I don’t have a mouse) so it’s not auto clicking

Answers

Answer:

yeah there is something wrong with the computer.. it can be virus or it can your mouse board. its not a hacker

Explanation:

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

Other Questions
do fertilizer also increase the number of bacteria as they do for plants, or do they increase when the decomposition of plants occur? please help I have forgoten do you like all modern Olympic rules if yes why if no why not give reson Would you categorize temperature as an Intensive or extensive property explain plz !!! sq root 30 A whole number, natural number, integer B rational C irrational D whole number, integer, rational Bacteria of species A and species B are kept in a single environment, where they are fed two nutrients. Each day the environment is supplied with 19,660 units of the first nutrient and 31,890 units of the second nutrient. Each bacterium of species A requires 4 units of the first nutrient and 5 units of the second, and each bacterium of species B requires 1 unit of the first nutrient and 6 units of the second. What populations of each species can coexist in the environment so that all the nutrients are consumed each day? A salesman's salary is $18,500 per year. In addition, the salesman earns 5% commission on the year's sales. Last year the salesman earned $25,400. How much was sold that year? A) what is cyber law? I've lost one of my gloves. must droppea_it somewhere. Their house is very near the motorway. It must be very noisy. You've lived in this village a long time. You must everybody who lives here. don't seem to have my wallet with me. I must at home. 'How old is Ed?' 'He's older than me. He must . at least 40.' didn't hear my phone. I must _ asleep. 'You're going on holiday soon. You must . forward to 'Yes, I am.' I'm sureyou know this song. You must _ .it before. The road is closed, so we have to go another way. There must an accident. 10 'Do you have a car?' 'You must-. How could I afford to have a car?'11 David is the managing director of a large company, so he quite a high salary. Need awnsers please Help solve pls fastit's a maths question 15=a/3-2 please help !! How do you say hello? Pil. Answer the following question:What do.you.meant by techical profession? What are the benefits of computer literacy? The epic of Gilgamesh is one of historys oldest surviving what Which is the cause of the suns magnetic properties ?A) upward movement or super heated gases in the convection zone B) uneven churning of plasma C) rapid spinning of metals in the core D) uniform clockwise rotation of charger particles during a load test, a battery's voltage drops below a specific value. what action should the technician take?A. Recharge and retest.B. Allow battery to become fully discharged and retest.C. immediately replaceD. None if above The length of each side of an equilateral triangle having an area of 93 cm is Donde dice en la biblia cudate que yo te cudar?