1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
5

What is the difference between the (BIOS) basic.input.output.system and R.O.M

Computers and Technology
1 answer:
abruzzese [7]3 years ago
6 0
EX: A BIOS is a file used to make an emulator work properly. <span>A ROM is a copy of a game downloadable online.</span>
You might be interested in
What does configsys mean​
Delvig [45]

Answer:

Definition - What does CONFIG. ... SYS is a configuration file on DOS systems. It is a text file that contains the settings and commands to load drives in a DOS system. This is a primary configuration file for OS/2 and DOS OS. This file was introduced in DOS and is replaced for 32-bit Windows versions with CONFIG.

Explanation:

6 0
3 years ago
If you flash UEFI and now your computer is no longer working, is there anything you can do to correct the situation?
Annette [7]

<u>Solution and Explanation:</u>

Unified Extensible Firmware Interface (UEFI) is a software program which connects the computer's firmware to its operating system (OS). UEFI is installed by the manufacturer and the first program to be executed when the computer is not turning on. UEFI or BIOS can be corrupted because of the upgrade error or any other damage.

Launch an automatic BIOS/UEFI recovery of the system so that the previous working best version of UEFI/BIOS is recovered and made available. On successful recovery of the BIOS/UEFI, the computer starts working.

6 0
2 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
2 years ago
The weight of your car will also affect its_____.
Usimov [2.4K]

Answer: C

Explanation:

4 0
2 years ago
Read 2 more answers
How do you set up nordvpn with spectrum?
Setler [38]

Answer:

simple

Explanation:

use nordvpn with discount code: Chonchode

7 0
2 years ago
Other questions:
  • As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed a
    9·1 answer
  • What is often called a platform, a collection of computer programs that work together to manage hardware and software to ensure
    12·1 answer
  • Text that does not fit in a cell
    7·1 answer
  • Since the actions in a textual storyboard are often very close to actual program code, the statements in a textual storyboard ar
    15·1 answer
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • Write a method that determines the total number of chars in each string of an array.
    12·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL dr
    7·1 answer
  • Wha are the types of slide show? define​
    10·1 answer
  • 1. Give the binary equivalents for the numbers 15, 24, 102?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!