1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
3 years ago
10

_____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players. Random-access memory Cache me

mory Optical storage memory Holographic memory Flash memory
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
4 0

Answer:

flash memory

Explanation:

flash memory retains information when power is removed, and is far more resilient and much quicker than optical or mechanical storage methods. flash is based on nand, or n and, and it does degrade over time, though usually not for a long time.

You might be interested in
Write a function called middle(string str) that returns a string containing the middle character in str if the length of str is
jenyasd209 [6]

Answer:

Note: a) If the length of the string is odd there will be two middle characters.

Explanation:

b) If the length of the string is even there will be one middle character. There was a problem connecting to the server. Please check your connection and try running the trinket again.

3 0
2 years ago
Which 4 elements are commonly contained in a master page?
Arturiano [62]

Answer:

if this is in aspnet then

Step 1: Open new project in visual studio.

Step 2: Add new file in to our project.

Step 3: Design the master page, using HTML.

Step 4: Add web form in to our project.

Explanation:

7 0
3 years ago
Which two statements describe the Functions of a modem
cupoosta [38]

Answer:

A modem is the internal or external device its function is to transfer data over communication lines

modems use two different types of data transmission

synchronous and asynchronous

The functions of modem have changed over years it was first used for telegrams and to transmit data in 1950s.

Modems were used with computers in  1977 for first time to transmit data between computers  firstly it was used for small amount of computers

As modem improves day by day and were able to transmit information fastly between two or more hosts and the internet network slowly spreads

There are four types of modems ,

1 Fax Modems which solely transfer data between fax machines

2 The traditional ISDN modem

3 the Digital Subscribers Line

4 the Cable Modem

Explanation:

3 0
3 years ago
Elaboren un texto acerca de una caracteristica o<br>componente de algun sistema tecnologico.<br>​
LUCKY_DIMON [66]

Answer:

<em>Teniendo en cuenta el sistema hidráulico se puede mencionar la siguiente característica teniendo en cuenta el principio de Pascal:</em>

  • <u><em>La presión ejercida sobre un fluido en área pequeña es igual a las fuerza ejercida sobre un fluido en un área más grande.</em></u>

Explanation:

<em>El principio de Pascal menciona en términos generales que l</em><u><em>a fuerza ejercida sobre un fluido se ejerce sobre el total del fluido y en todas las direcciones</em></u><em>, sin embargo, basado en este concepto se encuentra el principio de la prensa hidráulica (que se menciona en la respuesta), el cual se podría expresar de la siguiente forma:</em>

  • <em>F1/A1 = F2/A2</em>

<em>Donde:</em>

  • <em>F </em><em>= Fuerza ejercida.</em>
  • <em>A</em><em> = Área en la cual se ejerce la fuerza.</em>

<em>Lo que se busca es ejercer una fuerza en un área pequeña que se vea reflejado como una gran fuerza en un área más grande. Éste principio se suele usar para el levantamiento de maquinaria como automóviles en los concesionarios.</em>

8 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
4 years ago
Other questions:
  • Define reverse engineering in hacker context
    15·1 answer
  • To pinpoint an earthquake's location, scientists need information from how many seismometers?
    8·1 answer
  • which of the following is the term used for a set of programs that acts as an interface between the applications that are runnin
    7·1 answer
  • Which of the following is a feature that allows you to temporarily store text? A wordvault, B Clipboard,C Normal View, D typeove
    5·1 answer
  • -..
    11·1 answer
  • State what is meant by the terms: Parallel data transmission ...................................................................
    8·1 answer
  • The objects that you place on master pages are called _____.
    6·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • WHAT IS THE LOCATION OF “A”. ON THE GRID?
    15·2 answers
  • A character that <br>is raised and smaller above the baseline is called​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!