1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
2 years ago
12

Two types of storage memory​

Computers and Technology
1 answer:
Gnom [1K]2 years ago
6 0

Answer:

Primary and Secondary memory

Primary memory includes ROM and RAM

Secondary memory includes CD, hard drive, etc

You might be interested in
Can the redirection shell metacharacter be used to redirect between a command and another command?
Maksim231197 [3]
The answer is NO it cannot.
5 0
4 years ago
8. Suppose you've created a bulleted list, but the bullets are too close to the text. What is the best way to fix this?
Juliette [100K]

To fix a bulleted list that are too close to the text, you need to add space using the space key on your keyboard or adjust the indentation bullets on the ruler.

<h3 /><h3>How to add spacing in MS Word?</h3>

To format a bulleted list in this software, it is necessary to use the context menu by clicking with the right mouse button and displaying the List Paragraph dialog box, located in the styles panel, which makes it possible to adjust and apply the ideal spacing.

Therefore, you can use additional formatting on List Paragraph and adjust your work to your preferences.

Find out more information about MS Word here:

brainly.com/question/1538272

5 0
3 years ago
Place the steps in order for creating a Custom Search Folder in Outlook 2016.
TEA [102]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct order for creating Custom Search Folder in Outlook 2016 is given below:

  1. Click the Folder tab
  2. Click the New Search  Folder
  3. Open the Custom Search
  4. Choose your criteria and  
  5. Select folder in pane to
  6. Click ok to execute the search.

5 0
3 years ago
Read 2 more answers
When presenting, which tool would you use to highlight and magnify a section of the slide?
marysya [2.9K]
Well, the word magnify means to zoom, so I assume the correct answer is B. the zoom tool.
You would use this tool to zoom in your text which may be small, or to draw your audience's attention to specific details in your presentation. You would use the same tool to highlight a part of your slide.
7 0
3 years ago
Read 2 more answers
Which of the following are considered transactions in an information system?
Marrrta [24]

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

5 0
3 years ago
Other questions:
  • If you have an application that is not responding and you want to force it to shut down, whichsystem utility can you use?
    8·1 answer
  • How can cybercriminals harm a person whose personal information they have stolen
    7·1 answer
  • Interpretation is adding meaning to information by making connections and comparisons and by exploring causes and consequences.
    11·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa
    6·1 answer
  • Write a program that reads in the following data, all entered on one line with at least one space separating them: a) an integer
    13·1 answer
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • Select the device that will have the most network ports
    8·1 answer
  • How do I answer question
    8·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • you are pairing a bluetooth headset to a mobile device. on the device, after finding the device for pairing, what is the next st
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!