1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
4 years ago
9

The cmos memory located on the motherboard is often referred to as _____ memory because of its capability to store bios settings

.
Computers and Technology
1 answer:
user100 [1]4 years ago
4 0
This would be non-volatile memory
You might be interested in
Given the following class definition and the variable declaration:
Lorico [155]

Answer:

The answer is "Option d".

Explanation:

In the above-given code, two-class is defined that is "employee and manager", in which the first class "employee" defines two variables that are "name, id". In this name is pointer type character and id is a long type variable.

In the second class "manager" one variable "rank" and the employee object is created. In this class, the rank variable is a pointer type character, and outside this class, a reference "x" is created.

In this code, we use both class object that uses the "employee" class variable that is id to hold value in it.

7 0
3 years ago
?What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
pickupchik [31]
Open flow protocol is used
6 0
3 years ago
why is it when i go to social it shows a post from February it's like i am not with the ppl posting rn
Fittoniya [83]
Not sure. if youre online try messing with the filters if there are some, if youre on the app try updating it.
3 0
3 years ago
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
Write a function that computes the average and standard deviation of four scores. The standard deviation is defined to be the sq
ZanzabumX [31]

Answer:

#include<iostream>

#include<cmath>

using namespace std;

double calAvg(double s1, double s2,double s3, double s4);

double calStandardDeviation(double s1, double s2,double s3, double s4,double average,int n);

void main()

{

 double s1,s2,s3,s4;

double avg,StandardDeviation;

char option;

   do

{

 cout<<"Enter s1:";

 cin>>s1;

 cout<<"Enter s2:";

 cin>>s2;

 cout<<"Enter s3:";

 cin>>s3;

        cout<<"Enter s4:";

 cin>>s4;

 avg=calcAvg(s1,s2,s3,s4);

        sdeviation=calcStandardDeviation(s1,s2,s3,s4,avg,4);

 cout<<"Standard deviation:"<<sdeviation<<endl;

 cout<<"Do you want to continue then press y:";

         cin>>option;

}

       while (option='y');

}

double Average(double s1, double s2,double s3, double s4)

{

return (s1+s2+s3+s4)/4;

}

double calcStandardDeviation(double s1, double s2,double s3, double s4, double mean,int n)

{

double sd;

sd=(pow((s1-mean),2)+pow((s2-mean),2)+

                     pow((s3-mean),2)+pow((s4-mean),2))/n;

sd=sqrt(sd);

return sd;

}

7 0
3 years ago
Other questions:
  • When entering a function or formula in a cell, which is the first character you must type?
    15·2 answers
  • Reputable firms often ask recent graduates to pay an up-front fee for a job.
    10·2 answers
  • The Sussex Educational Processor executes an instruction every 3 clock cycles. Explain why that is the case and specifically wha
    12·1 answer
  • Betty removed a web page from her website. Some users were browsing on her website. One of them clicked on a particular link and
    10·1 answer
  • A page-ranking algorithm ranks web pages according to
    15·2 answers
  • Which method will return the first element in an ArrayList employees?
    5·1 answer
  • Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a siz
    11·1 answer
  • Write a function named is_sub_dict that accepts two dictionaries from strings to strings as its parameters and returns True if e
    5·1 answer
  • As we’ve discussed, computer programs are considered creative works and are protected by copyright. That means those programs be
    12·1 answer
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!