1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
14

Shelby likes to play video games on an old Atari video game system. No matter how old the cartridge, when she inserts it into th

e Atari console to play the game loads right away. What type
of memory is responsible for this process?
O Hard drive
O RAM
OROM
Storage
Computers and Technology
2 answers:
Nady [450]3 years ago
7 0

Answer:

ROM (Acronym of Read-only memory. (video games))

Explanation:

mixer [17]3 years ago
5 0

Answer:

hard drive

Explanation:

hard drive hope this helps

You might be interested in
Which of the following scenarios might indicate that you have been a victim of identity theft?A)Your credit report displays acco
victus00 [196]

Answer:

Option A is the correct answer for the above question.

Explanation:

A Victim is a person, who faces the problem of a criminal person. Here in the question, the scenario is that a user is a victim of the identity of being theft by some other person. So the user can get known by the help of option a, which suggests that the user's credit card report display something which is not done by him then it can be the scenario, where the user can understand that he is a victim. hence option a is the correct answer where the other option is not because--

  • Option B suggests the user does not pay the bill on time but it is a general case because the bill is paid by the user is in every month not a single time.
  • Option C suggests both options (A and B) are correct, but option b is not the correct.
  • Option D suggests that no option is valid from the above but option A is the correct.
7 0
3 years ago
Thomas owns a small Web services company and currently owns and maintains all his own computing hardware. He plans to develop an
Stels [109]

Answer: Hello the options related to your question is missing attached below are the options

answer : unlimited computing capacity for a low monthly fee ( A )

Explanation:

Since Thomas plans to develop a new service that will require his computing capacity to either double or triple, The best way of transitioning to the public cloud that might help Thomas meet up the requirement is Using unlimited computing capacity for a low monthly fee

7 0
3 years ago
We need ____ pointers to build a linked list.
adelina 88 [10]

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

3 0
3 years ago
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
DochEvi [55]

Answer:

A (because you can't have a chart without information, right?)

brainliest plz

Explanation:

8 0
3 years ago
Read 2 more answers
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Other questions:
  • ​your business has a web server that has suddenly become unresponsive. when you study the server's logs there are a huge number
    9·2 answers
  • Ryan needs to see the space available to insert content on a slide in his presentation. Which feature of a presentation program
    5·1 answer
  • There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in in
    10·1 answer
  • to add data to to a chart, you must format data from another microsoft office product, that automatically opens. whats the name
    10·1 answer
  • Which audio format is used to create chiptunes?
    12·2 answers
  • technician is dispatched to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive t
    5·1 answer
  • Write a calculator program that will allow only addition, subtraction, multiplication & division. Have the
    8·1 answer
  • Which are benefits of group discussions? Check all that apply. Learning becomes more interesting. Students engage in learning. L
    12·2 answers
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    10·1 answer
  • Write a method that makes the input string of sentences ending with and
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!