which of the following is the most reliable storage device:
floppy disk
hard disk
USB
RAM

Answers

Answer 1

Answer:

RAM is the most reliable storage device.


Related Questions

lauren wants to write short articles and post them online. if she has an internet connection, what software can help her do her work?

Answers

Lauren could accomplish her aim if she has an internet connection by making use of Zoho writer.

Zoho writer provides Lauren with a platform to write and post her documents as long as she has internet connection because zoho writer is cloud based.

The fact that Zoho writer ls cloud based, it means that only internet connection is required as the platform is equipped with a word processing tools and a clean user interface, which provides all the tools required to write a good document.

Therefore, zoho writer software could be adopted by Lauren once she has internet connection.

Learn more :https://brainly.com/question/24978746

Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever​

Answers

Cross bracing I think

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()

Answers

Answer:

Export ariana grande fort nite skin

Answer:

I M P O R T P I C K L E

Explanation:

Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2

Answers

Answer:

import java.io.*;  

public class Main {

   public static void main(String[] args) throws IOException {

       BufferedReader in = new BufferedReader(new InputStreamReader(System.in));

       String s;

       while ((s = in.readLine()) != null) {

           int total = 0;

           for (char character : s.toCharArray()) {

               if (s.charAt(0) == character) {

                   total++;

               }

           }

           System.out.println(total - 1);

       }

   }

}

Explanation:

We start the program by using the BufferedReader which will allow input from the user.

Then, we create a variable String that will take the input from the user.

Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.

For this, I initialized an integer variable total, that takes count every time the character is found.

Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.

If the condition is true, then the total will increment by one.

But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.

Without specifying total - 1, "n Monday" will output 2 since there are two total "n".

There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.

For that, before the for each statement, simply add s = s.toLowerCase();

3.5.7: Rectangle, Part 2 its python coding

Answers

The program which calculates the area of a rectangle written in python 3 is given thus :

def calc_area_rectangle(length, width):

#initialize a function named calc_area_rectangle which takes in two arguments

area= length * width

#the products of the arguments which are the length and width of value of the rectangle is assigned to the variable named area

return round(area, 2)

#the function returns the value of area rounded to 2 decimal places.

print(calc_area_rectangle(10, 20))

#sample run of the program

Learn more :https://brainly.com/question/25162828

2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.

Answers

Answer:

ok.... ..............

explain on what you did and give on how problems as such can be avoid inthe future

Answers

More info please, it is very invalid

A color image is made up of red green and blue color combinations 8 bits are used to represent each of the color components how many possible variations of red are there?

Answers

Answer: The three RGB colors are each 8-bits (possible values [0..255], 2 8 = 256) of each of Red, Green, and Blue. The three 8-bit RGB components can create up to 256×256×256 = 16.7 million possible RGB color combinations, called 24-bit "color". Of course, any one real photo image will not use most of these possible colors.

There is possible is the variation of the red color. The RGB is a combination of color. The 8 bit are the division of the 256 are equal to the 16 million.  

What is color?

The term “color” refers to the element of light. Color is part of communication. There are different colors that have different meanings, such as red, which represents love and danger. Colors are divided into different categories such as primary, secondary, and tertiary.

The color is the combination of the RGB colors. The letters R, G, and B stand for Red, Green, and Blue, respectively. The 8 bits for 256 shades of the RGB This means R = 256, G = 256, and B = 256 (256 × 256 × 256) are producing the 16 million colors. The variation of the red is possible to achieve an equal color.

As a result, the variation of the red color are possible are 256.

Learn more about on color, here:

https://brainly.com/question/19580247

#SPJ2

what is the answer ?????​

Answers

Answer:

1) Driver or option D

2) Kindle or option C

which type of broadband internet offers connections nearing the speed of light?

Answers

Answer:

FiberOptic connections

Explanation

One of the fastest data transfer methods for computers.

The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.

What is fiber-optic?

Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.

Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.

Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.

Therefore, the correct option is c. fiber-optic.

To learn more about fiber-optic, refer to the link:

https://brainly.com/question/10062531

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Cable.

DSL.

fiber-optic.

satellite.

why do cyber attackers commonly use social engineering attacks?

Answers

Answer:

Sometimes the computer's brain is too secure, so of that's the case you should just try to hack the human brain by tricking it to give you the password to an account, or whatever you are using it for.

Hope this help please give the brainliest award.

Answer:

Attackers can gain what they want while bypassing most technical security controls

Explanation:

.

what are the unique ICT needs for casinos?

Answers

Answer:

This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.

Explanation:

Why do we collect feedback on the code we write?

Answers

Answer:

to improve our code

Explanation:

"To improve our code" we collect feedback on the code we write.

Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.

Thus the above answer i.e., "option a" is correct.

Learn more about feedback here:

https://brainly.com/question/1603365

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​

Answers

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

did someone hang themself on the set of wizard of oz

Answers

No - it was a rumour that started when the film was having its 50th anniversary in 1989

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.

Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.

From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Learn more from

https://brainly.com/question/17956104

Help Digital photo class

Answers

Answer: i think the answer is c

Explanation:

Answer:

Here’s your answer!

Explanation:

I believe the answer to be D however if the camera still doesn’t work visit a camera shop for help.

Hope this helped

Brainliest please?

Dont forget to smash that heart at the bottom <3

Have a great day,you’re amazing!

how to generate random numbers in excel without duplicates

Answers

Answer:

Generate Random Number List With No Duplicates in Excel:

1. Select cell B3 and click on it.

2. Insert the formula: =RANDBETWEEN(10,30)

3. Press enter.

4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

a falsh movies consist of how many frame? ​

Answers

TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.
TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

most file managers include a way to create a folder through the save dialog box. true or false?

Answers

Answer:

false because most of the file managers just keep Everything organized by dates, years, and everything like that

Explanation:

The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA 23

did someone hang themselves on set of wizard of oz

Answers

No - its a rumour that has been going around since the films 50th anniversary in 1989.

what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?

Answers

Answer:

Proprietary Software

Explanation:

the fast speed of _______ available today enable computers to work very fast​

Answers

Answer:

main hardware components such as:

1. CPU

2. RAM

3. Motherboard (bus speed)

4. Hard drive

5. Video Card

6. Cache

7. Latest operating system (Windows XP, Windows 10, etc.)

!!HELP!!
I need to know what the code is!!

Answers

What is the webpage link then click ctrl i that will show source code I am not for shure if this helps if not let me know

HELP HELP HELP HELP HELP HELP PLEASE GUYS​

Answers

Answer:

word

Explanation:

Other Questions
Which of the following expressions is equivalent to 24/8 6/3 3?-7 6/3 3-28/4 3-28/24/9-7 6/9 i need your help to answer in the picture plss help me! Select the statements that correctly describe an meteoroid. Check all that applylargest of the space rocks.smallest of the space rockswhen in the atmosphere, they are called a meteorthey never come near Earth What does the article state about Percy Spencers character? Give four details Do you think there is a lack of access to mental health care? 2 1/16 as a improper fraction Lena's Coffee Shop makes a blend that is a mixture of two types of coffee. Type A coffee costs Lena S4.10 per pound, and type B coffee costs $5.95 perpound. This month's blend used twice as many pounds of type B coffee as type A, for a total cost of $336.00. How many pounds of type A coffee were used? Which of these statements is NOT true about the drug utilization management (UM) rules?If a member or the prescriber believes that one of the coverage rules should be waived, they can ask the plan for an exception.If a medication has a UM rule, it must be disclosed to the consumer.Prior authorization, quantity limit, and step therapy are some examples of UM rules.If a medication has a UM rule, the member will not be able to get that medication. HELP ME PLEASE What is 6,728 16 A can of soft drinks is $1.50 and a bottle of juice is $ 2.80 .what would it cost to buy two cans of soft drinks and a bottle of juice ? Which of the following describes the authors purpose in paragraph 1? A. to share how difficult it was to celebrate mistakes B. to show how skeptical she was of celebrating mistakes C. to share an experience in which she celebrated mistakes D. to show how she teaches her students to enjoy making mistakes What do you do in your free time? :D Need asap! If Greek gods and goddesses are still present today, in what way can they help make the world peaceful in terms of contentment, love for family, truth and justice, and honor? Study the timeline. Which statement indicates what the fossil record suggests about evolution on Earth? How many 1/4 cup servings are in 4 cups? los chicos no_____simpaticos which items are associated with the cultures of the northwest indians y=2x =2 and y2= 4x+4 which angles are alternate interior angles Can anyone help me and if u dont know how to do it dont comment on my stuff