It is true or false .Today optical technology is used in hard disk drives.​

Answers

Answer 1

Answer:

False

Explanation:


Related Questions

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

help me to solve please​

Answers

Explanation:

Pendrive - small external hard disk

ROM - read only memory - cannot be changed info

printer - produces the hard copy output

mouse - points and selects GUI

ALU - mathematical calculations

Answer:

Explanation:

mouse:points and selects GUI objects.

printer:It produce the hard copy output.

ALU:performs mathematical calculations.

ROM:the instructions stored in it can not be

changed by user.

Pendrive:it can be considered as a small external

hard disk.

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible

Answers

Answer:

648

Explanation:

---

Conditions: Not allowed to start with 0 // No repeating digits

---

9 possible ways for first digit (excluding 0, therefore 1-9)

e.g. 123, 234, 567

9 possible ways for second digit (excluding 0 and digit before 1-9)

e.g. 123, 124, 125

8 possible ways for third digit (excluding 0 and condition for second digit 1-9)

e.g. 789 is legit, but 788 is not

Multiply 9*9*8 to get an answer of 648

what is the full form of XML?​

Answers

Answer:

extensible markup language

XML is “extensible markup language”

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

Under Conversions in the Goals > Goal URLs report, when you add a Secondary Dimension for "Sales Region" and filter the report results by "/registersuccess.html", how many goal completions did EMEA have?


a. 7

b. 52

c. 63

d. 543

Answers

I guess the answer is C

The number of individuals who successfully complete your destination goal divided by the total number of visitors to your site is used to compute goal completion rate. The Analytics dashboard can be used to evaluate various data and figure out how many of your clients are accomplishing your objectives. Thus, option C is correct.

What goal completions EMEA have?

When a visitor completes an activity that you are tracking, such as making a purchase, adding an item to their cart, or signing up for a newsletter, it is referred to as a goal conversion (or goal fulfillment).

A goal is a completed task, also known as a conversion, that helps your business succeed. An online purchase, completing a level in a mobile game, or submitting a contact form for a lead generation or marketing website are all examples of goals.

Therefore, 63 goal completions EMEA have.

Learn more about EMEA here:

https://brainly.com/question/29669912

#SPJ2

Rebecca is designing an in-store display to promote a new board game, which is packaged in orange. What would be the most effective color to use for the display background

Answers

Answer:

...

Explanation:

Unless this is a multiple-choice question, then by using the standard defintion of "orange" (not "yellow orange" or "sunburnt orange"), my answer would be blue, white, black, purple, and sometimes even brown.

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

I'm really weak at computers can someone please help me with these questions ​

Answers

Answer:

DIM count, number, previous, temp AS INTEGER

 count = 0

 number = 1

 previous = 1

again:

 count = count + 1

 temp = number

 number = number + previous

 previous = temp

 PRINT number

 IF count < 10 THEN

    GOTO again

 END IF

Explanation:

Here is the code for the first assignment. Can you think about the rest indicate where you get stuck?

what do you understand by cloud computing? list the advantages of clould computing. ​

Answers

Answer:

cloud computing is the on demand availability of computer system resources and specially data storage and without direct active management by the user.

the advantages are ;

business countunuity

acess to automatic updates

scalability

collaboration efficiency

Can i have the answer of that fill in the blanks

Answers

Answer:

c) {n/a}

d)Binary codes

e)NLP

f)Application software

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

Explain why this product was created?

Answers

Explanation:

Product was created becaus the first and most important reason for any new development is to provide new value to the customer. Without this, there is no reason for them to trade their money for the new device. However, if the product or service offers overwhelming value, then customers will flock to it.

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

What is more important, the individual or the collective (the group)? Why?

Answers

Answer:

rhe group

Explanation:

one can always work individually but as a group more get done

what are some of the opportunities that the stem program offers?

Answers

Science, technology, engineering, and mathematics (STEM) programs open the door to many different careers, including opportunities in engineering, science, and research. STEM professionals can explore diverse fields like aeronautics and biochemistry. Some STEM students also apply their technical knowledge in law, politics, and education.

Information obtained via: https://www.bestcolleges.com/careers/stem/

The incident response team found malware on several user workstations. Trying to remove the malware infection is becoming time consuming. There is important data on the workstations. Which of these actions will recover the workstations back to a malware-free state? Check all that apply.

Answers

Answer:

Use an Antivirus with PC TuneUp Utility

Explanation:

I think you need to install Eset Nod 32 Antivirus software to scan all your system from malware and viruses.

The second thing is to have a  PC Utility Program to scan for spyware, junk file cleaning, removing registry errors etc. will help your PC run smooth and safe from threats.

Antivirus: https://www.eset.com/us/home/antivirus/

PC Cleaner: https://cyberlab.com/

Hope this helps.

The actions which will recover the workstations back to a malware-free state are:

Rebuild the machine.Restore file backup.

What is a malware?

A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc and destruction.

In computer technology, the actions which will recover the workstations back to a malware-free state are:

Rebuild the machine, so as to restore it to a known good configuration.Restore file backup after rebuilding the workstation.

Read more on workstations here: brainly.com/question/959479

#SPJ2

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

list out the storage measurements units of a computer .

Answers

Answer:

Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million byte

Answer:

Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million bytes.

A program virus infect​

Answers

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

(C
What is the most effective way to demonstrate being prepared for an interview?
O Ask to speak to people at the company whom you have met with before.
O Send a list of your references to the interviewer before the interview.
Mention something you learned about the company during the interview.
O Prepare a short speech about your strengths and weaknesses.

Answers

Answer:

I think it is send a list of your.............

Answer:

its B drop a like

Explanation:

Mark true or false IT questions

1:you can change the default font style in word ( )

2:A pie chart represent only one data series ( )

3:MS-DOS is a graphical user interface operating system ( )

4:a presentation software is a application software ( )

5: only addition can be done in the ALU ( )

fill in the blanks...............

1:A ................... mouse is looking like a pencil

2:A/An ......................... is an interface between the user and the computer​

underline the correct answer

1: the.......... function multiple the numbers in Excel

add

sum

products

Min

2:to enter the data in multiple lines

wrap text

merge and center

orientation

all of these

3:a list is used when the unordered of items is marked

bulleted

numbered

both a and b

non of these

4:the screen that you see after you signed in the computer

wallpaper

desktop

screen saver

non of these

5:the ............. manages the working and control of a network device

Device driver

kernel

file system

all of these

Answers

Answer:

1. true

2. true

3. false

4. false

5. false

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a hacker or something wronging with the computer (I don’t have a mouse) so it’s not auto clicking

Answers

Answer:

yeah there is something wrong with the computer.. it can be virus or it can your mouse board. its not a hacker

Explanation:

Write a short note on the fifth generation computer​

Answers

Answer:

It's component is bio chips.

It is used in present-future.

I think operating speed is Mili second.

Other Questions
Germs are to disease as war is to A. destruction B. soldiers C. tanks D. enemies Like what is this and how do you do it please explain clearly and understandable HELPP- Which options describe key ideas found in "Ain't I a Woman?"? Select all that apply. Ain't I a Woman? 0 As a slave. Truth worked and suffered as much as a man. O Truth believes that people should have equal rights regardless of their intellect. Truth was able to eat as much as men but often went hungry. Truth states that Christ was born from a woman and God, not a woman and a man. A tower is 320 feet tall. A model is being built for an architecture project and the model is 8 inches tall. Write theinformation that completes the scale for the model. Complete them so the 320 foot height of the tower and the 8 inch heightof the model are still valid for every case.16 inches : ______ feet Which of the following can be referred to as a d7 ion? * O Cu4+ o Mn 4+ O O O Ni4+ O None of the above . In what way was the Byzantine Empire multicultural? please help me hurry this is due tomorrow Why was the Han Dynasty considered the golden age? Which two particles are present in the nucleus of an atom? Electrons and neutrons Electrons and molecules 1 TH O Protons and neutrons O Protons and electrons how free trade rather than protectionism can favour countries. If other factors are held constant, how does sample size influence the likelihood of rejecting the null hypothesis and measures of effect size such as r^2 and Cohen's d?A) A larger sample increases both the likelihood and measures of effect size.B) A larger sample increases the likelihood but has little influence on measures of effect size.C) A larger sample decreases the likelihood but has little influence on measures of effect size.D) A larger sample decreases both the likelihood and measures of effect size. In the shorthand notation for a galvanic cell, a double vertical line (A) represents 123) A) a gas B) a cathode C) a salt bridge D) a single phase boundary How are the Torah and the Christian Bible similar? How are they different?The Torah is the Old Testament, while the Christian Bible contains the Old and New Testament.The Torah is a record of past events, while The Christian Bible is a moral guide.The Torah and the Christian Bible are exactly the same.The Torah is the Old Testament, while the Christian Bible is only the New Testament. Find the expression for f(x) that makes the following equation true for all values of x.(81^x)/9^5x-8=9^f(x) Free fall on a small airless planet. A rock released from rest to fall on a small airless planet falls y = gt^2 m in t sec, g a constant. Suppose that the rock falls to the bottom of a crevasse 20m below and reaches the bottom in 4 sec. A) Find the value of g. B) Find the average velocity for the fall. C) With what velocity did the rock hit bottom? All of the following are mistakes to avoid in making rational decisions except letting sunk costs matter. focusing exclusively on fairness sticking to the status quo. making purchases using net benefit analysis. Aimee deposited $250 into a savings account with the simple interest of 6% per year.After 4 years, how much money, in total, will she have in her account? explain the socio-cultural factor affecting birth rate. THE father is 20 years older than his son five years ago he was three times as old as his son was find their present ages (STEP BY STEP PLZ) (HOPE U ENJOY IT) How has modern research inchemistry impacted society?