write down a description of how a magnetic had drive works

Answers

Answer 1

Answer:

This is how a magnetic hard drive works

Explanation:

The hard drive contains a spinning platter with a thin magnetic coating. A "head" moves over the platter, writing 0's and 1's as tiny areas of magnetic North or South on the platter. To read the data back, the head goes to the same spot, notices the North and South spots flying by, and so deduces the stored 0's and 1's.

Hope it helps pls mark as brainliest


Related Questions

What does “int” means in php code

Answers

Answer:

integer

Explanation:

What is the features of Mark 1​

Answers

Answer:

Okay:

Mark I was enourmous in size, measuring 8 feet high, 51 feet long and three feet deep. It weighed 5 tons, used 530 miles of wire and 730,000 separate parts. The operation of these parts was powered and synchronized by a long horizontal rotating shaft. A four horsepower engine drives the mechanical parts.

Harvard Mark I, an early protocomputer, built during World War II in the United States. While Vannevar Bush was working on analog computing at the Massachusetts Institute of Technology (MIT), across town Harvard University professor Howard Aiken was working with digital devices for calculation. He had begun to realize in hardware something like the 19th-century English inventor Charles Babbage’s Analytical Engine, which he had read about. Starting in 1937, Aiken laid out detailed plans for a series of four calculating machines of increasing sophistication, based on different technologies, from the largely mechanical Mark I to the electronic Mark IV.

Explanation:

hope it is helpful to you

______ greetings are used when we talk to friends or family members.

A)Formal

B)Informal

C)Gestures

D)None of these​

Answers

Answer:

B. Informal

Explanation:

You know your parents, greet them normally

Answer:

Informal

Explanation:

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage

How to Fix 0xc000007b

Answers

Answer:

Method 1. Restart your computer

The first thing to try is restarting Windows. It sounds too simple, but it sometimes yields results.

Method 2. Update .NET framework

In most cases it's Microsoft .NET framework causing the issues. You can download the latest version of .NET Framework from Microsoft.

When it's installed (or re-installed) reboot and try your app or game again

Method 3. Enable Administrator rights

Try running the game or app with admin rights. To do that, right-click on the shortcut or the actual executable for the game, select Properties and open the Compatibility tab. Tick the 'Run this program as an administrator' box, and click on OK.

Method 4. Reinstall the app or game

You can uninstall and re-installing the game or program you're trying to run - simple but sometimes the quickest and most effective way to get rid of the error.

Method 5. Update Windows

Update Windows. In many cases Windows will automatically update, but to check, head to Control Panel and search for 'Windows Update'.

In later versions, including Windows 10, you can open the new Settings app (just search the Start menu or click the cog icon which appears just above the Windows logo when you click it in the bottom-left of the screen.

In the Settings app, click on Update & Security then you should see a button to check for updates:

Explanation:

Method 6. Run ChkDsk

Run chkdsk by opening cmd (search for it or press Win+R).

In the window type "chkdsk c: /f /r". If it is the primary windows disk, it will ask you to schedule it for next boot. When you restart, it will do a check before get to the login screen. Partitions or other drives can also be checked this way.

Method 7. Reinstall DirectX

This can be the fix for games that won't load. The way to do this depends on your version of Windows and which version of DirectX you need. There are full instructions on Microsoft's website

Hope it's help you. :-)

The database model that uses a series of two-dimensional tables or files to store information is the ________________ model. This database model has become the most popular database structure, as it is used by most microcomputer DBMS packages:

Answers

Answer:

The relational database model

Explanation:

The database model that uses a series of two-dimensional tables or files to store information is the relational structure model.

What is the relational structure model?

The relational model (RM) is known to be set up for database management as it is a method used in managing data via the use of a structure and language that are in line with first-order predicate logic.

Note that The database model that uses a series of two-dimensional tables or files to store information is the relational structure model.

Learn more about database from

https://brainly.com/question/26096799

#SPJ9

In the cases of int, byte, long, short (In Java) Can you give the heirachy in ascending order?​

Answers

Answer:

Byte Short Int Long

Explanation:

Byte's 8 bit, short's 16, int's 32, and long's 65.

When testing for current in a cable with eleven ​color-coded wires, the author used a meter to test five wires at a time. how many different tests are required for every possible pairing of five ​wires?

Answers

Multiply 5 times 5, then times 11, and you'll get 275.

What are limitations of AI

Answers

Explanation:

Limitations of artificial intelligence. One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale.

Answer:

Risks and limitations of artificial intelligence in business

Businesses are increasingly looking for ways to put artificial intelligence (AI) technologies to work to improve their productivity, profitability and business results.

However, while there are many business benefits of artificial intelligence, there are also certain barriers and disadvantages to keep in mind.

Limitations of artificial intelligence

One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale. To overcome this, you should have a clear strategy from the outset for sourcing the data that your AI will require.

Another key roadblock to AI adoption is the skills shortage and the availability of technical staff with the experience and training necessary to effectively deploy and operate AI solutions. Research suggests experienced data scientists are in short supply as are other specialised data professionals skilled in machine learning, training good models, etc.

Cost is another key consideration with procuring AI technologies. Businesses that lack in-house skills or are unfamiliar with AI often have to outsource, which is where challenges of cost and maintenance come in. Due to their complex nature, smart technologies can be expensive and you can incur further costs for repair and ongoing maintenance. The computational cost for training data models etc can also be an additional expense.

Software programs need regular upgrading to adapt to the changing business environment and, in case of breakdown, present a risk of losing code or important data. Restoring this is often time-consuming and costly. However, this risk is no greater with AI than with other software development. Provided that the system is designed well and that those procuring AI understand their requirements and options, these risks can be mitigated.

See also Industry 4.0 challenges and risks.

Other AI limitations relate to:

implementation times, which may be lengthy depending on what you are trying to implement

integration challenges and lack of understanding of the state-of-the-art systems

usability and interoperability with other systems and platforms

If you're deciding whether to take on AI-driven technology, you should also consider:

customer privacy

potential lack of transparency

technological complexity

If you're considering writing a tender document to procure AI, you can seek help from the Northern Ireland Artificial Intelligence Collaborative Network(link is external).

AI and ethical concerns

With the rapid development of AI, a number of ethical issues have cropped up. These include:

the potential of automation technology to give rise to job losses

the need to redeploy or retrain employees to keep them in jobs

fair distribution of wealth created by machines

the effect of machine interaction on human behaviour and attention

the need to address algorithmic bias originating from human bias in the data

the security of AI systems (eg autonomous weapons) that can potentially cause damage

the need to mitigate against unintended consequences, as smart machines are thought to learn and develop independently

While you can't ignore these risks, it is worth keeping in mind that advances in AI can - for the most part - create better business and better lives for everyone. If implemented responsibly, artificial intelligence has immense and beneficial potential.

Write a program that keeps names and emails addresses in a dictionary as key-value pairs. First print all keys with their value using for loop.then the program should display a menu that lets user look up a person’s email address, add a new name and email address, change an existing email address and delete an existing name and email address

Answers

The program keeps names and email addresses in a dictionary as key-value pairs, as written below.

What are codes?

Codes are the language that is used to write programs.

f=open('email.dat','rb')

  d=pickle.load(f)

  f.close()

except:  

  d={}

while True:

  print('\n1. Find a email address')

  print('2. Add name and email address')

  print('3. Change an email address')

  print('4. Delete an email address')

  print('5. Exit\n')

  choice=input('\nEnter a choice: ')

  if choice:

      choice=int(choice)

  else:

      print('\nEnter a number')

      continue  

  if choice == 1:

      while True:

          name=input('\nEnter the name ')

          if name:

              if name in d:

                  print('\n%s is the email id of %s \n' % (d[name],name))

                  break

              else:

                  print('\n Email not found \n')

                  break

          else:

              print('\nName cannot be empty\n')

              continue

  elif choice==2:

      while True:          

          name=input('\nEnter the name ')

          if name:

              break;

else:

              print('\nName cannot be empty \n')

              continue

      while True:          

email=input('\nEnter the email address ')

          if email:

              d[name]=email

              break

          else:

              print('\nEmail cannot be empty\n')

              continue

        elif choice==3:

      while True:          

          name=input('\nEnter the name to change the email address ')

          if name:

              if name in d:

                  email=input('\nEnter the new email address ')

                  d[name]=email

                  print('\nEmail address changed \n')

                  break;

              else:

                  print('\nName not found \n')

                 break

          else:

              print('\nName cannot be empty \n')

              continue

  elif choice == 4:

      while True:          

          name=input('\nEnter the name to remove ')

          if name:

              if name in d:

                  del d[name]

                  print('\nName and Email address removed \n ')

break;

              else:

                  print('\nName not found \n')

                  break

          else:

              print('\nName cannot be empty\n')

continue

  elif choice == 5:

      f=open('email.dat','wb')

      pickle.dump(d,f)

      f.close()

      sys.exit()

  else:

      print('\nEnter a valid choice ')

Therefore, the codes are written above.

To learn more about codes, refer to the link:

https://brainly.com/question/28848004

#SPJ5

What are the useful techniques in program design?

Answers

A broad question, with many answers.

When designing a program you can use:

Setting up requirements, possibly in a use-case form ("as a ... I want to ... so that ...")Mapping the verbs and nouns in your requirements to classes and operations Drawing UML diagrams of the subject matterCreating flow charts and sequence diagrams Identify component boundaries with thin interfaces to keep complexity organized and local

Why are the social and ethical consequences of emerging technology hard to
predict?

Answers

Answer:

Technology is rapidly evolving over a short period of time. Which leads to a change in how people perceive and subsequently react to these fast paced advances.

Answer: try this one: It is impossible to see how technology will be applied to situations that have not yet occured.

Explanation: if it’s wrong please tell me

Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Responses For extending the learning experience for students. To make sure the presentation is linear So students can use the Slides for review and can go to additional resources outside of the presentation. To make the presentation more graphically appealing

Answers

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

What are examples of some Exotic currencies?
A) EURUSD, AUDUSD
B) GBPCHE, EURUSD
C) AUDCHF, NZDJPY
D) MXN, ZAR, HKD

Answers

Answer:

D) MXN, ZAR, HKD

Explanation:

Exotic currencies refer to currency that are used in countries with emerging economies therefore they lack liquidity, are extremely volatile and have very low volumes. The exchange rate of exotic currencies are usually very high because of its lack of liquidity, therefore trading these currencies are expensive. Examples of exotic currencies are South African rand (ZAR), Mexican peso (MXN), Hong Kong dollar (HKD), Chinese yuan (CYN), Turkish lira (TRY) and so on.

Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this thread1) cannot proceed because itâ s waiting (either directly or indirectly) for another thread (letâ s call this thread2) to proceed, while simultaneously thread2 cannot proceed because itâ s waiting (either directly or indirectly) for thread1 to proceed. The two threads are waiting for each other, so the actions that would enable each thread to continue execution can never occur.

Answers

Answer:

"Deadlock" is the right solution.

Explanation:

A deadlock seems to be a circumstance where certain (two) computer algorithms that share a similar resource essentially prohibit each other during manipulating the asset, leading to both programs withdrawing to operate.This occurs when multiple transfers or transactions block everyone by maintaining locks onto assets that every other activity also needs.

So that the above is the correct answer.

Draw a truth table & logic circuit corresponding to the following logic statement
X = 1 if ( ( M is 1 OR N is 1 ) AND ( M is 1 AND N is 1 ) ) OR ( O is NOT 1 )

Answers

Answer:

The truth table, as well as the logic circuit of the given statement, is attached below.

Explanation:

Logical gates seem to be the essential building blocks of just about any computerized signal. It becomes a digital device with one or even more inputs and therefore only single output. The arrangement among outputs and inputs would be focused on this kind of logic. Upon that basis, logic gates were already called as AND, NOT, OR gate, etc.

What visual practice provides more information about logical relations when creating an ERD

Answers

Answer:

Logical Data Model

Explanation:

An Entity Relationship Diagram (ERD) is a model or a diagram designed to reveal the relationship between various entities such as people, places, objects, and so on within an institution. Entity relationship diagram is also known as Entity relationship model. This model is used to design relational database by various sectors such as education, engineering, business, etc.

ERD is designed using conceptual data model, logical data model, and physical data model.

The visual practice or model that gives more insight into the logical relations among the entity is the logical data model.

The logical data model is used to illustrate more detailed operational and relational data among the entities. It is more detailed than the conceptual data.

So, the correct answer is logical data model.

Other Questions
which situation is most likely to show a constant rate of change What is the name of CaCl2 7H2o Find the area and perimeter of shape ABCD with vertices A = (-1,-1), B = (2,3), C = (5,3), D = (8,-1). An investor buys a 10-year, 7% coupon bond for $1,050, holds it for 1 year, and then sells it for $1,040. What was the investor's rate of return? Find the domain of the function f(x) = 7x2 + 8x - 15. Someone please answer this emergency pleaseee 25 POINTS! The graph shows two lines, M and N. A coordinate plane is shown with two lines graphs. Line M has a slope of 1 and passes through the y axis at negative 2. Line N has a slope of 1 and passes through the y axis at negative 2. How many solutions are there for the pair of equations for lines M and N? Explain your answer. PLS ANSWER AS SOON AS POSSIBLE P(2, 2), Q(1, -3), R(-4, 2), S(-3, 7) Using the information above, answer the following questions. Find the length of RS Find the length of SP Find the length of PQ Find the length of RQ Use this information to determine if the quadrilateral a parallelogram. A projectile is fired straight up from ground level with an initial velocity of 112 ft/s. Its height, h, above the ground after t seconds is given by h = 16t2 + 112t. What is the interval of time during which the projectile's height exceeds 192 feet?A. 3B. t4D. 3>t>4 You spend $3.50 on fruit. Apples cost $0.20 each while oranges cost $0.30 each. The equation models the situation, where x is the number of apples and y is the number of oranges. Which of the following is not a possible solution in the context of the problem?a. 1 apple; 11 orangesb. 11 apples; 1 orangec. 7 apples; 7 orangesd. 4 apples; 9 oranges Please help me ASAP! The angles of a quadrilateral are in the ratio of 2:6:9:13Find all the angles of the quadrilateral There are two cube-shaped tanks. One of the tank has a 3 m side, while the other one has a side measuring half of the first one. Which tank can store more water and why which regions highlighted on the map above correctly shows the location of the great plains what value of x is in the solution set of 2(3x1)>4x6? You have 3.00 m3 of a fixed mass of a gas at 150 kPa. Calculate the pressure if the volume is reduced to 1.20 m3 at a constant temperature. Simplify 4 + (3 8) The weight of the buggy was 40N on Mars. When the buggy landed on Mars it rested on an area of 0.025 m2. Calculate the pressure exerted by the buggy on the surface of Mars why might rainforests in South America and near the equator be so productive? A correct name for the following compound is:_________.a) 4-bromo-3,8-dimethylbicyclo[5.2.2]nonane b) 3,8-dimethyl-4-bromo-bicyclo[5.2.O)nonane c) 4-bromo-3,8-dimethylbicyclo[5.2.1]decane d) 7-bromo-2,6-dimethylbicyclo[5.2.0]nonane e) 4-bromo-3,8-dimethylbicyclo[5.2.0]nonane