A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage?

Answers

Answer 1

Answer:

Answered below

Explanation:

A secondary storage device, also called external storage or auxiliary storage device, is a non-volatile, internal or external storage device. They are storage devices that are used to store data permanently and can be used to store large amounts of data. Applications and programs in a computer, such as operating systems, drivers, files, applications etc are stored in the secondary storage device.

Examples of these devices include;

Hard disk drives, solid-state drives, CD-ROMS, DVD, Google drive, USB flash drive etc.


Related Questions

Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?

Answers

Answer:

The answer is "Evacuation".

Explanation:

The evacuation in coolants was its removal from the coolant of heat, air, and non-condensable toxic gases. Its seal HVAC system is drawn to a vacuum and use a pressure washer throughout this process.  

It loses the air and water vapor throughout the coolant point is called it. The two primary goals are accomplished by evacuating, that are eliminates content and hydrates.

Answer:

the answer is c i belive

Explanation:

i belive this is the answer good luck :>

An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs troubleshooting? PLEASE ANSWER FAST BECAUSE I AM AT THE TEST AND THESE ARE THE CHOICES. (a)core network (b)Demarcation point (c)Local loop (d)Wide Area Network (WAN) But it's not D because I tried it and it was wrong

Answers

Answer:

The answer is "Option c".

Explanation:

In the given-question, option c, that is "Local loop" is correct because it used to describe an actual connection line combines the two points, which starts from the starting point, and ends when the ending point for the communication carrier and the wrong choice can be defined as follows:

In option a, It's also known as the backbone network, that provides a network for all elements, that's why it is wrong.In option b, It is an extension, that's why it is wrong.In option d, It is used to cover the wide area, that's why it wrong.

Fixing a connection problem which is detected to be outside a carrier's regional office will require troubleshooting of the local loop.

Exploring the options given :

The core network covers the main or core portions of a telecommunication network which functions to provide pathways for the exchange and transmission of information between subnetworks and LANs. (Wrong).

The Demarcation Point simply means the point whereby a consumer's cable physically enters his building. It marks the point where the public network cable of a telecommunication company connects with the consumer's in-house connection or wire. (Wrong)

Local loop : These covers the area from the public communication company or service provider's office or grid up to the Demarcation point. Since the connection problem has been found to be outside the provider's regional office, then the local loop is the area which requires troubleshooting. (Correct).

Wide Area Network : Refers to a network coverage which spans over a large area. (Wrong).

Therefore, the most appropriate option is the local loop

Learn more : https://brainly.com/question/12021531?referrer=searchResults

In a Comparative Government course, the first unit focuses on the US Congress and the
second unit focuses on the British Parliament. When reading the textbook before class,
John tries to understand Parliament by relating it to his knowledge of Congress. What
is this an example of?

Elaboration
Retrieval practice
Monitoring
Summarization

Answers

Answer: The answer is Summarization

The method that's used by John is referred to as the retrieval practice.

Retrieval practice refers to a strategy that is used when an individual tries to retrieve a particular information that he or she already learned in order to boost learning.

Retrieval practice is also used to enhance the mind of the person. Since John tries to understand Parliament by relating it to what he already knows about Congress, then this is retrieval practice.

Read related question on:

https://brainly.com/question/21981917

An example of a credible site would be

Answers

Answer: Government or Educational websites

Answer: C, Your School’s Site

Explanation:

Right on edge, good luck :)

You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues

Answers

Answer: 1, 6, 11

Explanation:

To avoid communication issues based on the space of the environment the channels that should be configured should be done within an interval of 5. So it should be taken as 1, then the next 6 and finally 11. These helps to avoid communication issues.

Answer:

You should configure it on Nicki Minaj

Explanation:

Which transmission media is faster? Fibre Optic or Radio-waves? I want full explanation!

Answers

Answer:

Due to the direct line of sight,the data rate of radio links is higher than that of fiber optic connections. A radio link has a lower latency (less delay).In contrast ,fiber optic connections may achieve higher bandwidths

Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves moving computing resources out to the Internet.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Cloud computing may be defined as an on-demand availability of any computer system resources. These are especially the data storage as well as the computing power, without the direct active management by a user.

It is the delivery of the computing services which including  storage, software databases, analytics, servers, networking and intelligence.

Hence the answer is false.

How can I make my Wi-Fi signal fast? I am going through my exam but my Wi-Fi is not supporting plz help.

Answers

Answer: Maybe try to move router.

Explanation:

What can you do to make a positive digital footprint for yourself? pls hurry due at 12:30 PM Group of answer choices Post only once a day. Adjust your privacy settings to control who sees your posts. Use only apps that make pictures and posts disappear. Share as much as you can with your best friends.

Answers

Answer:

Share as much as you can with your best friends.

Explanation:

Positive Digital footprint is a term that simply defines as a positive reputation or impression an internet user leave behind online or other online users' positive perception of such user, often in an online discussion group or social media website in general. This includes positive content such as comments, posts, and shares posted by the users or tagged by other users.

Hence, to make a positive digital footprint, a user should "share as much as s/he can with his/her best friends." This will make such users leave a positive digital footprint because often than not, it is always happy moments and subjects such users will be sharing.

What is the primary browser of Windows 10?

Answers

Answer:

Microsoft Edge

Explanation:

The new and updated Microsoft Edge is the main browser of the Windows 10. Hope this helps!

The "global digital divide" is a digital divide between countries. True or False?

Answers

Answer:

False I think

Explanation:

Answer:

False ofcourse

Explanation:

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?

Answers

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

Harper runs her company's social media site. The company has a family-friendly
image. She likes and shares things that are for adults. What did Harper do wrong?

Answers

Answer:

The sharing (severally) of adult material on the social media site of her company that has a family-friendly image

Explanation:

According to social media ethics, what is shared in an online platform with other users has to be fit for the consumption of the users of the platform.

As internet access provides opportunity to make friendships, connections, and opinions, as well as share information, it is important that before sharing a content, a person should have in mind the audience of the said content. It is also important for the person about to share a content to be cognizant of whom they represent.

Which are Career and Technical Student Organizations? (Check all that apply.)

Answers

Answer: BPA (Business Professionals of America)

DECA (formerly Distributive Education Clubs of America)

Educators Rising.

FBLA-PBL (Future Business Leaders of America-Phi Beta Lambda)

FCCLA (Family, Career, and Community Leaders of America)

FFA (formerly Future Farmers of America)

Explanation: these are all i cant think of at the moment. sorry! but i hope this helps :)

The Careers and Technical Student Organizations are:

BPA DECA FBLA-PBLFCCLA FFA

What is a career?

A career is known to be the kind of work a person do for a living.

Note that  career can be a single job or a lot of jobs and it is one that is specific to a field.

Hence, the Careers and Technical Student Organizations are:

BPA DECA FBLA-PBLFCCLA FFA

See options below

Business Professionals of America

American Association of School Administrators

American Chemical Society

DECA

Future Business Leaders of America

FFA

SkillsUSA

FCCLA

Learn more about Career from

https://brainly.com/question/14864800

#SPJ2

The concept of "space" on a computer usually refers to the___.​

Answers

Answer:

Option "A" is the correct answer to the following question.

Explanation:

Word 'Space' use for total storage available in hard drive.

Free storage in the hard drive is commonly called space, space is an empty place similarly free or empty space in a hard drive called "Space".

Usually, the term space is used for the empty place, so we can say that the appropriate choice is correct.

Answer: storage available on the hard drive

Explanation:

Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way as to render them unusable by unauthorized third parties?

a. Default allow
b. Separation of duties
c. File encryption
d. Fail-secure

Answers

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

Which recovery method allows users to back up their personal files to an external drive or network share without administrative assistance?

Answers

Answer:

File history

Explanation:

File history recovery method  allows users to back up their personal files to an external drive or network share without administrative assistance. File History is a backup program that holds your personal files saved in the directories archives, desktop, favorites, and Contacts. It searches the file system regularly for changes, and copies modified files to a different location.

Is there a link between the fields of multimedia and animation? Explain.

Answers

Answer:

Yes

Explanation:

A major link between multimedia and animation is the fact that both are used to express thoughts and actions which may be in different forms.

Multimedia just as its name involves the combination of media formats like image, video, and sound to express thoughts, etc

Animation also expresses thought but in a different form by creating moving pictures out of still images with the addition of sound etc

By changing the field size for text to the maximum number necessary,
A. The file will not take up as much space on the database
B. The field will autocorrect any terms over the size
C. The field will select the most important information if over the text limit
D. The file will be stored in a different format.

Answers

Answer:

The correct option is;

A. The file will not take up as much space on the database

Explanation:

Changing the field size of a field that does not contain data limits the size of taken up by the data values added to the field. The field size for text field determines the disc space that each value of the field allowed to take up by Access

When the field size is changed for fields containing data, the data values in the field that have values higher than the maximum field size are truncated while the field size of subsequent data are limited as stated above.

why are the ads you might see on tv between 8am and 10am usually not the same ads you would see between 8pm and 10pm?

Answers

Answer:

THEY rotate.

Explanation:

What does filtering a record do?
A. It suppress some records and show others
B. It removes records from the document permanently
C. It sorts all the data in the record
D. It arranged all the information in one column

Answers

Answer:

A it supress some records and show others

Explanation:

example filter is when we apply show only senior citizens. then a new view is created that contains only senior citizens. the original data will be there but filtering only shows the data which has that condition

I handle the graphics that are displayed on the monitor (what part of the computer is this)?

Answers

Answer:

Graphics Card or Video Card

Explanation:

true or false: the larger your sample size for a survey, the more likely it is that you will draw false conclusions from your information.

Answers

False. The more people you have the more likely you will have true conclusions...

Answer:

false

Explanation:

While accessing mail through the mail command interface, a user sees 5 new messages in his mailbox. Since the second message appears important, he would like to read that message first. Which mail command should be used

Answers

Answer:

The answer is "print 2".

Explanation:

The mail command, which is also known as the return path, bounce address, as well as mfrom, and sends the back address. This command is used to set the message receiver, order RCPT. It's also composed of the message for the header, and it is the empty line of the message body, and in this command to read the second message we use the print 2 message.

The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * symbol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8)

Answers

Answer:

The correct program is as follows:

num = float(input ("Enter a number: "))

print(num * 8)

Explanation:

Notice the difference between (1)

num = float(input ("Enter a number: "))

print (num * 8)

and (2)

input ("Enter a number: ")

print(num * 8)

Program 1 is correct because:

- On line 1, it takes user input in numeric form, unlike (2) which takes it input as string

- On line 2, the program multiplies the user input by 8 and prints it out

Which type of test is run in non-production subnets where you’ve configured a duplicate of the production environment?

Answers

Answer:

Laboratory Test

Explanation:

The lab test runs on a non-product subnet, where it configures duplicates of the production environment. It mirrors the entire system, including the firewall. These test-runs test anything that interferes with the production environment.so correct answer is Laboratory Test

How do you do basic addition and subtraction in binary, octal and hex?

Answers

Explanation:

The use of numerical systems arose from the need of man to improve certain mathematical calculations as time goes.

Several factors demanded the study and application of mathematical operations using decimal numbers. Among these factors, technological advancement essentially from the first experiments in the use of electronics.

There are several numeric systems, but four of them stand out: decimal, binary, octal and hexadecimal.

The decimal system is used every day in countless ways and, no doubt, is the most important number system. He has ten digits with which can form any number through the law.

Non-decimal systems such as binary, octal and hexadecimal are critical in the areas of digital and computer techniques. Through these systems is possible to perform logical combinations and working with computer programming languages. This article will show the link between the logical circuits and these numbering systems.

2 - The Binary Numbering System

The binary numbering system is composed of only two digits:

Zero (0)

One (1)

To represent zero amount using the number 0; to represent a quantity, use the digit 1.

Assuming you need to represent the number two. Which digit you can use, if there is no number 2 in that system?

We have the following response. In the decimal system, we do not have the number ten and represent the amount of ten using the digit 1 followed by the digit 0. In this case, the number 1 means that we have a group of ten and the digit 0, no drive, which means ten.

In the binary system, do likewise. For you the amount of two, we use the digit 1 followed by the digit 0. The figure 1 means that there is a group of two elements and 0, a group of any unit, thus representing the number two.

The table below helps us to understand the differences between the decimal and binary system, using this rule. The number sequence displayed to the number nine.

Decimal

Binary

0

0

1

1

2

10

3

11

4

100

5

101

6

110

7

111

8

1000

9

1001

2.1 - System Conversion binary to Decimal System

To better understand the conversion we use a decimal number either, for example, 356. This number means:

3 x 100 + 5 x 10 + 6 x 1 = 356

Hundred ten unit

3 x 10 � + 5 x 10 � 6 x 10 + 10 = 356

We realize that the least significant digit (6) multiplies the unit (1), the second digit (5) multiplies the ten (10) and the most significant (3) multiplies the hundred (100). The sum of these results will represent the number.

In General, the formatting rule of a number is the sum of each digit multiplied by the corresponding base (in the example, the number ten) high for an index as the positioning of the digit in the number.

In another situation, we will use a binary number, for example, the number 101. We can conclude that it is equivalent to number 5 in the decimal system. Using the concept of a number, we will convert the number to the decimal system as follows:

1 0 1

1 x 2� + 0 x 2� + 1 x 2

Answer:

add them togehter by each side and than for triangles divide by half love you

Explanation:

You have a multi-domain Windows Server 2016 forest. You need to make a shared folder available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?

Answers

Answer:

Universal

Explanation:

The active directory has the following group scopes based on the level the group will be granted permission;

Universal

Global

Domain Local

With the Universal group all accounts within the domains located in the network forest can be added as well as Global groups and Universal groups within the same forest can be added. Members in the Universal group can be granted permissions to the resources on any domain located in the forest.

Which of the following STEM discoverers developed a new type of computer hardware?

Answers

Which of the following STEM discoverers is known for creating complex computational physics to develop computer models to simulate fluid movement?

Edison

Fedkiw

Gates

Hawking

Answer:

Fedkiw

Explanation:

Ronald Fedkiw is a professor at Stanford and also a STEM discoverer that is credited with developing a new type of computer hardware model which was used to simulate fluid movements.

His invention has helped him win various awards because it has helped professionals and technicians create visual effects for videos.

explain how to number text in a document​

Answers

Answer: Just start typing

Explanation: Click anywhere and start typing

Other Questions
How does Care define "an Englishmans liberty"? PLSSSSS HELP MARKING BRAINLIST PLS I THINK NO ONE WILL HELP ME :( Identify the CTSO that is most appropriate for each example. Fritz wants to prepare for a career as a High School Teacher: Mina wants to become an Elementary School Teacher: Rob wants to prepare to become a strong member of his family: Sara wants to become a leader in her community: The federal government passes a law which a company, JuneCorp, feels unjustifiably discriminates against the company and harms its ability to operate. Under the strict scrutiny test, which of the following statements is true? a. JuneCorp cannot contest the law because the government makes the laws and therefore has the final say. b. JuneCorp can contest the legality of the law if all three scrutiny tests determine that the law is necessary.c. JuneCorp can contest the legality of the law if the law doesn't serve a state interest. d. JuneCorp cannot contest the legality of the law if only its finances are harmed. Any distinct quantity contained in a polynomial.O PowerO TermO BaseO Integer A reaction between 7.0 g of copper(II) oxide and 50 mL of 0.20 M nitric acid producescopper(II) nitrate, Cu(NO3)2 and water.(c) Determine the limiting reactant.(d) Calculate the mass of excess reactant after the reaction.(ANS: 6.6068g)(e) Determine the percentage yield if the actual mass of copper (II) nitrate obtained fromthe reaction is 0.85 g.(ANS: 90.64%)How to get the mass of HNO3 from here? I only managed to get mass of NO3 based on the molarity formula. thanks! How do I "undo" multiplication How is the United Kingdoms parliamentary system of government different from the United States federal system? Which statement is true about a person who is in good health? She spends a lot of time alone She has few friends at school She may not be in good physical health She gets along with others What is on spanish 3 module 3 dba on flvs? Manny is watching the past three seasons of a The Big Bang Theory. He watched 8episodes in 6 hours. At this rate, how many episode will he watch in 15 hours?9048203.2 based on the signal word another what is the relationship between these sentces How are islands formed q2-b2Evaluate if a=4 and b =-2 Find the difference between the cash price and the payment plan and calculate the interest rate for the following questions.1. A food processor for $149.50 cash, or $5.00 down and $10.00 per month for 15 months2. A television for $675.00 cash, or $52.00 down and $120.00 per month for 6 months3. A smartphone for $150.00 cash, or $25.00 down and $12.00 per month for 11 months4. Bedroom furniture for $1,985.00 cash, or $400 down and $74.00 per month for 24 months5. A jacket for $75.00 cash, or $25.00 down and $4.75 per week for 11 weeks6. The Smiths bought new furniture that cost $3,298.00. The store offered them an option of putting $600 down and making equal payments of $300 a month for 10 months. Use the Federal Reserve System formula to find the APR the Smiths will pay for taking this plan. The integeris neither positive nor negative. Where are hormones made? Which direction would you travel to get from Utah to Colorado What led to the case of Marbury v. Madison? 1.the Midnight Judges Act eliminating key federal positions 2.President James Madison issuing a writ of mandamus 3.Congress passing the Judiciary Act of 1789 4. Adams quickly appointing federal positions at the end of his term Why was it important for a country to have more exports than imports?