What is HDD in computer and technology

Answers

Answer 1
An HDD is a traditional storage device that uses mechanical spinning platters and a moving read/write head to access data.
Answer 2

Answer:

Hard Disk, also called hard disk drive or hard drive. It used as Storage.

Storage devices like hard disks are needed to install operating systems, programs and additional storage devices, and to save documents.

Storage Capacity:

16 GB, 32 GB and 64 GB. This range is among the lowest for HDD storage space.120 GB and 256 GB. This range is generally considered an entry point for HDD devices such as laptops or computers.500 GB, 1 TB and 2 TB. Around 500 GB and above of HDD storage is typically considered decent for an average user. More than 2 TB. Anything over 2 TB of HDD space is suitable for users who work with high-resolution files, Currently, the highest capacity HDD is 20 TB.


Related Questions

A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.

Which options should they choose during their evaluation process? Check all that apply.

a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated

Answers

A professor who publishes world population research in a journal

Answer:

b,c,d

Explanation: i took the test and bc im awsome

what is the answer
i don't know how to decode this, could i get the answer without any links

Answers

Answer:

Try the Cesar cypher

Explanation:

The Cesar cypher shifts the letters one side

Which of the following is NOT a correct flowchart shape?

A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star

Answers

I think the answer is star because in a flowchart, the most common shapes are a parallelogram, ovals, diamonds, and rectangles. Stars aren’t used in flowcharts.

Hope this helps :)

Answer: Star

Explanation:

A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system

Answers

The team that should operates the security system is the blue team.

What is war gaming strategy?

In a war game approach, the teams of the senior managers of a  firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.

Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.

Learn more about cybersecurity from

https://brainly.com/question/26260220

How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.

Answers

To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.

What is technology promotion?

The use of technology is one that can promote student zeal by given them a form of positive experiences.

Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.

Learn more about technologies from

https://brainly.com/question/25110079



Differentiate between
Operating system and
language translator

Answers

It is a program or a series of programs which provides communication between the user and the computer hardware. Translators are programs which convert instructions in assembly language or high level languages into machine languages because computer can only understand machine language.

How many internet browser sessions can you have open at one time?.

Answers

Theoretically there is no limit that I know of, however it uses RAM and will eventually use all available RAM.

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as _____.

Answers

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.

What is webpage context?

The web page context is known to be a kind of special ID that is is formed with all the new page load event.

The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.

Learn more about website design from

https://brainly.com/question/25941596

Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends

Answers

The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.

How can I employ Predictive Scaling with target tracking?

Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.

Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.

Learn more about Autoscaling  from

https://brainly.com/question/17661222

The way in which information travels on the internet, not as a single piece but in chunks.

Answers

If this is a true or false question then it’s true.

If your asking for what those chunks are then packets. I’m a packet addict.

In what way. If any, does click-lacking differ from cross-site scripting?

Answers

Answer:

In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.

Explanation:

write a program to calculate sum of first ten natural numbers​

Answers

Answer:

Explanation:

total = 0

i = 0

while i<=10:

   total = i +total

print(total)

Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas

Answers

Answer:

The answer is ( D ) I hope this answers your question

The master program that manages how other software can use the computer hardware is called the:.

Answers

the master program that manages how other softwares use the computers hardware is called the bios

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

The following flowchart symbol is used to repeat instructions:

A. Rectangle
B. Square
C. Circle
D. Hexagon

Answers

d

Explanation:

⇛σ=

n

∑f(x−

x

)

2

Find f(x-x^-)²

It's

313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29

3360.5

Now

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}

⇛σ=

67.21

\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}

⇛σ=8.2

You can access elements in a list by using an index the same way that you can index a character from a.

Answers

One can access elements in a list by using an index the same way that you can index a character from indexing into the string.

What is String Indexing?

Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.

They can be accessed straight through the use of  numerical index. String indexing in Python is known to be a kind of zero-based in nature.

Learn more about indexing from

https://brainly.com/question/4692093

a customer willl borrow

Answers

Answer: C. the PC

Explanation: The motherboard is not included in the passage

Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?

a. Each person needs to send email with his/her part of the project individually every day

b. Each person should be on a cloud folder and sync their files as they are working through their project

c. Each person needs to send a group email to the team as soon as any updates are completed

d. Each person should post their updated information on a team website so it is available for anyone to see

Answers

The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.

What is cloud computing?

Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.

In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.

Read more on cloud computing here: https://brainly.com/question/19057393

[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.

Answers

It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.

What arithmetic operations cannot be done on pointers?

We cannot carry out all type of arithmetic operations with the use of the pointers.

Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.

Learn more about arithmetic operations  from

https://brainly.com/question/4721701

_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.

Answers

Answer:Encryption

Explanation:I took my test for CIS 110 and guessed and got this question right.

Which ready-to-use features do WYSIWYG editors offer?
A.
meta tags
B.
database
C.
HTML tags
D.
web host
E.
image gallery

Answers

Answer:

C. HTML tags

Explanation:

In computing, WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed.

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^

In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO

Answers

Answer:

Boot loader

Explanation:

This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory

which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website

Answers

Hello!
Answer: B. Library.

I hope this helps you!

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

define a touch-sensitive pad and state one use​

Answers

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:

Please help me on this it’s due now

Answers

I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.

Definition:

            Logistics Manager: person in charge of overseeing the purchasing

                                            and distribution of products in a supply chain

            Material Handlers: responsible for storing, moving, and handling

                                            hazardous or non-hazardous materials

            Inventory Managers: oversee the inventory levels of businesses

Hope that helps!

Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.

Answers

The answer is D
Ik this cause I took the test

Answer:

B

Explanation:

The reason I say "D" is not the answer because I put the answer in and it was wrong.

C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not

Answers

Answer:

take a subtle aproach

Explanation:

Other Questions
maurice et Geoffroy vont le musee d'orsay les amis Qu vas a hacer en verano?what do that say heeeeeeeeeeelllllllllppppppppppppp The bakers at healthy bakery can make 320 bagels in 10 hours. How many bagels can they make in 15 hours? What was the rate per hour? The yellow tang fish eats algae off of the green turtle. What is this relationship an example of?Interdependence Independence Dependence Commensalism your older sister tells you that you seem to be short for your age. in school, your teacher measured your height and that of your classmates to compute for your BMI. you teacher tells you that your height belongs to the 9th decile in the class. assuming you and your classmates have similar ages, would you agree with what your sister says? why? Mrs. smith has $1500 in a retirement account earning 5% interest. each year she makes an additional deposit of $500 to her account. after 3 years, what would her account balance be? Consider three independently assorting gene pairs, A/a, B/b, and C/c, where each demonstrates a typical dominance (A-, B-, C-) and recessiveness (aa, bb, cc) relationship. What is the probability of obtaining an offspring that is triply dominant from parents that are AaBbcc and AaBbCc If you knew this was your last day, would you do the same things youre doing? Understanding how artificial intelligence, big data, and collaborative computing will impact your organization is the challenge of managing for:. What would NOT be considered routine practice during or after conducting uncomplicated aseptic surgical procedures in nonhuman primates If a house is 4,753 sq. ft, at the cost of $175/sq. ft what is the total cost of the house? When is Search and Seizure Justfied? PLEASE ANSWER NOW!!!!!!!!!!!!!!How did the negotiations after WWI contribute to the start of WW2?our response must be at least 3 complete sentences. You must use at least 2 of the 3 of the following in your answer: Treaty of Versailles, the Great Depression, and totalitarianism. Which of the following terms denotes the chromosomes which are similar in size, shape, and genetic material? PLEASE HELP TAKING TEST RN what are the midline, amplitude, period of this function? What is stress and what can it do to you? The store clerk ______ the products. Verb phrase What made gates a ambitious project Find the area of the figure.