What type of file system is used by sdxc memory cards?

Answers

Answer 1

Answer:

ExFAT

Explanation:

A: Required: Create and delete file of the programs are a. process control b. file management ... question_answer Q: 350. __________ is used to shift processes so they are contiguous


Related Questions

Which are types of online resources that students can use for help? Check all that apply.

Answers

What are the choices ?

Answer:

A, B,E.

have a great day

List several things that geographers can map using remotely sensed data

Answers

Remote sensing refers to the process of taking earth's measurements using sensors from the satellites or airplanes. The sensors collect information in image form, these images are then analysed to obtain necessary information.
Geographers can map a lot of things using remotely sensed data, these things include: any location on the earth surface, vegetation distribution, water bodies distribution, etc.

You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to the root user account. when you need to switch to root user to perform administrative tasks, what command would you enter at the command prompt?

Answers

I use "su -" on my box. Red Hat wanted "sudo -i" in the RHCSA and RHCE courses.

Assuming you are using the sun sdk, what command would you type at the operating system command prompt to compile the program labassignment.java?

Answers

Assuming javac is on the PATH variable:

javac labassignment.java

Otherwise, it would have to be:

/path/to/javac labassignment.java

A web application server that is compromised in a cross-site scripting attack is said to be

Answers

Cross-site scripting attack ( XSS ) occurs when malicious script are injected into web sites. An attacker uses web application to send malicious code.
Answer:
A web application server that is comprised in a cross-site scripting attack is said to be B. injected.     

What is the purpose of using modulo 2 arithmetic rather than binary arithmetic in computing an fcs?

Answers

Final answer:

The purpose of using modulo 2 arithmetic in computing an FCS is to detect transmission errors through simple and efficient calculations. It provides a checksum that can be used to verify data integrity, detecting common errors like single-bit and burst errors. This method does not require handling carry operations, simplifying implementation.

Explanation:

The purpose of using modulo 2 arithmetic in computing a Frame Check Sequence (FCS) is to provide error detection capability when data packets are transmitted over a network. Modulo 2 arithmetic is a simple, efficient method of calculating a type of checksum that can be used to verify the integrity of the transmitted data. By performing bitwise exclusive OR (XOR) operations on the data bits, modulo 2 arithmetic generates a value that can be appended to the data. When the data is received, the same operations are performed, including the FCS. If the result is zero, it is assumed that the data has not been corrupted during transmission.Modulo 2 arithmetic is used because it resembles binary addition without carry. It simplifies the hardware or software implementation since handling carry operations is not required. Also, modulo 2 arithmetic can detect common errors such as single-bit errors and burst errors that can occur in communication channels, providing a simple yet robust way to ensure data integrity. This method is commonly used in network protocols, for example, in the Cyclic Redundancy Check (CRC).

Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion sort runs in 8ð2 steps, while merge sort runs in 64ð log2 ð steps. for which values of ndoes insertion sort beat merge sort?

Answers

well i think u should give up on school and just  smoke some green fam.

The area that holds all the instructions the computer needs to start up when it is powered on is ________. the cpu rom ram the usb

Answers

ROM (Read Only Memory)

Which of the following definitions describes a receptacle ground fault circuit interrupter (GFCI)? A. Includes an extension cord B. Protects a worker by increasing the duration of an electrical shock C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet D. Replaces a circuit breaker on the main circuit board Suspend Assessment

Answers

C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet

Which of the following choices is not an operating system? A. DOS B. UNIX C. Windows 97 D. Windows Vista

Answers

It should be A. DOS because all of the others are operating systems.
A. Cuz all the other ones are known world wide

What motivates engineers to make tcp/ip packets more independent?

Answers

The TCP/IP model has four layers: application, host-to-host layer, internet layer and network access layer.  
TCP is the transmission protocol that is used and it is connection-oriented.
IP stands for Internet. 
A stream of bytes is broken into segments and reconnected at the other end. The packets are retransmitted whatever is lost and the segments are organized might in the correct order. 
The boom of new different applications that should be interoperable motivates engineers to make tcp/ip packets more independent.

A right turn should be from the right lane into the right lane of the roadway entered. True or false. A. True B. False

Answers

it depends if it's America or another continent but assuming it's America I would say A.True

________ allows visitors to add, remove, or edit its content.

Answers

That would be Wiki.......

Sql statements that define the objects such as tables, indexes, triggers, etc. in a database are referred to as _______________ statements.

Answers

source statements i hope this helped

To reboot a pc, hold down the ____ keys at the same time.

Answers

CTRL+ALT+DELETE

Sometimes called a three finger salute.

alt f4

Explanation:

alt f4 is the goatttttttttttttttttttttttttttttttttttttttttttttttttttt

The main reason to use a visual aid in a presentation is to

a ensure concepts are more challenging to understand.
b make a challenging concept easier to understand.
c guarantee that complex information is accurate.
d keep an audience’s attention through distraction.

Answers

D keep the audiences attention through distraction

Answer:

d keep an audience’s attention through distraction.

Explanation:

Advantages of Visual Aids in a Presentation:

A picture is worth a thousand words - presentation softwares let you display images and videos that help prove the speaker's theses. By using graphics to show trends or using photographs to showcase a product, the speaker helps the audience better visualize (and therefore understand) what he or she tells you.Appeals to many senses - While oral speech mainly stimulates hearing, the use of multimedia tools stimulates other senses, especially vision. To see is to feel. And for some auditoriums that makes all the difference: Have you ever wondered why tradeshow vendors insist on permanently repeating demonstrations without forgetting the videos that explain the benefits of their products?Greener and more versatile support - Multimedia presentations save paper: a single presentation can be seen by all members of the auditorium without photocopying. On the other hand, they allow greater creativity and originality in the presentation of contents when compared to paper.Easy content creation - Multimedia tools allow you to quickly and simply dress up and embellish the speaker's ideas and make them visually appealing. In fact, no Visual Design course is required to make captivating slides.

Hard disk storage technology can be classified as ____ storage.

Answers

Persistent (between boots) or permanent.

âthe first line in a hypertext markup language (html) file is the _____, which is a processing instruction indicating the markup language used in a document.

Answers



This is usually not needed anymore in the updated versions of HTML 5.

Answer:

The first line in a hypertext markup language (html) file is the Doctype, which is a processing instruction indicating the markup language used in a document.

The correct answer is:

Doctype

Explanation:

The Doctype is the abbreviation for document type declaration which is an instruction related to XML and SGML documents that makes them adopt a document type definition to be shown as an element compatible in that format. In other words, it allows them to be from one type and be translated into another type without visual or presentation modification. It is just to be more flexible, fast, and manipulable.

Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during the presentation, and she would like to place images of isolated video frames in her outline so that she remembers exactly what to talk about when the corresponding part of the video is played to her audience. Which tool would be best for Maureen to place these images in Word, and why?

Answers

A copy and paste would be fastest and easiest. As you can pinpoint the exact location to where you want the picture to be. 

Answer:

The tool that would be best for Maureen to place the image in Word is the Screen Clipping tool because it allows to pick a window that is opened in the device and insert the screenshot of it in the document.

Explanation:

The screen clipping tool allows you to take a screenshot of a window that is opened in the device and add it to the document in which you are working.

To use it you have to click on the part of the document where you want to put the image and click on the insert tab and then, screenshot. After this, you will see the windows that are opened and you can choose the screenshot you need or select a part of it. Then, the image is added to the document. According to this, the tool that would be best for Maureen to place the imagen in Word is the screen clipping tool.

What does limited access to a document mean?

It makes a document inaccessible without a password.
It enables a person to make changes and automatically save them.
It does not reflect any changes made in the document.
It enables a person to read the document but not edit it.
It blocks a person from accessing a document.

Answers

the second last one is the answer i think

Answer:

C). It enables a person to read the document but not edit it.

Explanation:

Limited access to a document is primarily associated with the creator of document restricting the usage and changes that can be made to a specific document. It assists the users to protect the authenticity of their document and prevent it from any unnecessary editing to the document. Therefore, the limited access to a document would imply 'enabling a person to only read the document but not edit or make changes to it' without the creator's permission. It is thus aimed to limit the access to a specific content. Therefore, option C is the correct answer.  

Attacks that take place against web based services are considered to be what type of attack?

Answers

cyber attack is correct

Proprietary file types are easily displayed in Word documents, Web pages, etc.
Question 15 options:

True


False

Answers

it should be true :)

Answer:

It is true

Explanation:

I took the test

What are the two main components on the motherboard?

Answers

A chipset which forms an interface between the CPU's front-side bus, main memory, and peripheral buses. Non-volatile memory chips (usually Flash ROM in modern motherboards) containing the system's firmware or BIOS. A clock generator which produces the system clock signal to synchronize the various components.
The processor(CPU) and the memory

PLZ HELP ASAP!!!
The CPU is referred to as the ______ of the computer.

A. brains
B. face
C. heart
D. soul

Answers

the CPU would be the brain so A) 


have a wonderful rest of ur day :)

Which component, located on the motherboard, carries out all the instructions provided by computer programs? ram?

Answers

The Chipset is the component located on the motherboard, this carries out all the instructions provided by computer programs. It is the integrated circuit that manages all the data flow between processor and memory. It usually works with microprocessors and plays a crucial role in determining system performance.

When reassembling your pc what does the text recommend as the first step?

Answers

When reassembling your PC the first step is to wear an anti shock bracelet to ground yourself from the electricity. Then take a Philips head screwdriver and take the machine apart. Typically the hard drive is taken out first and then the RAM.

Each hard disk is divided into pie-shaped groups of ____.

Answers

sectors







-------------------------------

After a worksheet has been displayed in page layout view, page breaks are indicated by ________ in normal view.

Answers

After a worksheet has been displayed in page layout view, page breaks are indicated by dotted lines in normal view. Typical view for used for creating and viewing presentation slides is called normal view and is also known as slide view. Which offers a full size view of a slide, making it easier to create a slide.

Which option enables you to keep the last grammatical change

Answers

To keep last grammatical change in a word processor, one should look for the "Undo" or "Ctrl+Z" option.

How do we use it in word processor?

In most word processors like Goo/gle Docs, we can simply press "Ctrl+Z" or select the "Undo" option from the menu to revert the last grammatical change you made. This feature allows to quickly correct any mistakes or undo changes that you may have made unintentionally.

Its helps for maintaining the correctness and clarity of your documents. So, if we want to preserve the last grammatical we will use the "Undo" function in the word processing software.

Read more about grammatical change

brainly.com/question/33472332

#SPJ1

The name of an array stores the ________ of the first array element

Answers

address. The equivelent of array[ 0 ].
Other Questions
Propose three ways in which the government can ensure that the help iy offers is received by only the people who are in need What is the r (common ratio) for the geometric sequence: -3, -15, -75, -375, -1875... Which type of activity is la Biguine? a game a race a dance a food contest Suppose you made the observation that bees seem to prefer a yellow flower that produces abundant amounts of pollen and nectar over a purple flower that produces less pollen and nectar. list two separate hypothese that you might make about bees and flowers Which area of the world was hardest hit by AIDS? The hero of an epic poem, such as Beowulf, normally embodies the ideals of conduct that are most valued by the culture in which the epic was composed. Write an essay in which you show how Beowulf embodies the ideals of conduct in the Anglo-Saxon culture. You should mention at least four of Beowulfs virtues. For each one, cite the part or parts of the epic where the virtue is displayed. The seeds of the internet were planted in 1969 with _________, which connected computers at four universities in the western united states. Complete each phrase by writing the correct Spanish adjective.Remember that Spanish adjectives must agree in gender, and number with the nouns they modify.1. las mesas (big)2. las sillas (small)3. la nina (pretty)4. el senor (tall)5. los muchachos (blond)6. el amigo (intelegent) Gerald is a mechanical engineer who can examine and detect a problem, determine cause and effect, and provide a solution. gerald's skill is called ______ skill. Rashida uses 8 cups of tomatoes and 3 cups of onions to make salsa. How many cups of onions should rashida use if she uses only 4 cups of tomatoes Solve the following equation, answer as a reduced, mixed number.4(7x - 1) = 3(2x + 1) - 4(x + 6) As compared with their likelihood at public schools, child homicides are _____ likely at private schools. what was thomas ' job at the time he met alice cogswell True or false: atoms in each state of matter are always in motion Compared with a ph of 7, a solution of ph 5 has what times/fraction of the hydrogen concentration? Would you expect to find black sand beaches on Kauai? Why or why not? In contrast to a unitary system of government, a ____________________ system of government divides power at the local, state, and national levels. which american region was home to the hopi, navajo and pablos indians? Which of these affirmative words in spanish means also or too The supremacy clause sets up a hierarchy that allows federalism to operate. What is correct hierarchy from greatest to least of the following? 1. state laws 2. acts and treaties of Congress 3. city and county ordinances 4. the Constitution 5. state constitutions Steam Workshop Downloader