1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
2 years ago
3

_____ is data and instructions entered into the memory of a device.

Computers and Technology
1 answer:
Arturiano [62]2 years ago
8 0

Answer:storage

Explanation: this is the answer b/c any data that enters the memory of a computer is STORAGE


( hope this helped )

You might be interested in
What command should you use to rearrange parts of files on the drive so they are contiguous?
Sunny_sXe [5.5K]
<span>What command should you use to rearrange parts of files on the drive so they are contiguous? Answer = Defrag</span>
3 0
4 years ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
What is cloud based LinkedIn Automation?
Zielflug [23.3K]

Answer:

The cloud-based LinkedIn automation tool makes life easier for you by automating functions like sending connection requests, liking and commenting on posts, sending customized messages, and much more.

6 0
3 years ago
Read 2 more answers
A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado l
EastWind [94]

Answer:

The answer is:

H_0:\mu=2.2\\H_1:\mu> 2.2

Explanation:

H_0:\mu=2.2\\H_1:\mu> 2.2

The test value of statistic t= \frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}

                                               =\frac{2.31688-2.2}{0.206915}\\\\=0.56

The value of P = P(T>0.56)

                          =1-P(T<0.56)

                          =1-0.712

                          =0.288

  • Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected.  Don't ignore H0.
  • This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.
6 0
3 years ago
Using Matlab programming I need to rotate the line defined by x,y by 45 degrees around 2,2
belka [17]

Answer:

% here x and y is given which we can take as

x = 2:2:10;

y = 2:2:10;

% creating a matrix of the points

point_matrix = [x;y];

%  center point of rotation  which is 2,2 here

x_center_pt = x(2);

y_center_pt = y(2);

% creating a matrix of the center point

center_matrix = repmat([x_center_pt; y_center_pt], 1, length(x));

% rotation matrix with rotation degree which is 45 degree

rot_degree = pi/4;      

Rotate_matrix = [cos(rot_degree) -sin(rot_degree); sin(rot_degree) cos(rot_degree)];

% shifting points  for the center of rotation to be at the origin

new_matrix = point_matrix - center_matrix;  

% appling rotation  

new_matrix1 = Rotate_matrix*new_matrix;          

Explanation:

We start the program by taking vector of the point given to us and create a matrix by adding a scaler to each units with repmat at te center point which is (2,2). Then we find the rotation matrix by taking the roatational degree which is 45 given to us. After that we shift the points to the origin and then apply rotation ans store it in a new matrix called new_matrix1.

4 0
4 years ago
Other questions:
  • In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class,
    8·1 answer
  • If you want to insert a column into an existing table what would you do
    11·1 answer
  • ________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor
    13·1 answer
  • Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What
    12·1 answer
  • You must keep track of some data. Your options are: (1) A linked-list maintained in sorted order. (2) A linked-list of unsorted
    5·1 answer
  • What is a text based language that can be used to build all kinds of things ????
    9·1 answer
  • The lenght of a formula Can't be more than ________ characters​
    11·2 answers
  • 1. What was the very first “photo-realistic CGI character” to appear on-screen in a movie (released in 1985)?
    8·2 answers
  • Haya would like to complemely delete Slide 11 from her presentation so that slides 12–16 become slides 11-15. What is
    9·1 answer
  • Write a C program to insert and delete values from a stack(to perform pop and push operations) using an array data structure
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!