1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
9

A ____ is approximately a billion bytes.

Computers and Technology
1 answer:
GalinKa [24]3 years ago
3 0
A gigabyte is approximately a billion bytes...

You might be interested in
A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him
DerKrebs [107]

Answer:

The components within the computer can get damage during travel, so he could improve the box protection with foam thingies

Explanation:

3 0
2 years ago
What are the preset formulas in a spreadsheet called?
Oksanka [162]
They are called functions on a spreadsheet.
5 0
4 years ago
Read 2 more answers
Project planning output is :
-Dominant- [34]

Answer:

A

Explanation:

The main output of Project palnning is project plan.

5 0
3 years ago
Match each operating system drawback to its respective operating system.
Lena [83]

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

4 0
3 years ago
Read 2 more answers
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
Other questions:
  • How can cybercriminals harm a person whose personal information they have stolen
    7·1 answer
  • What document is created to identify the areas of testing of a website?
    8·1 answer
  • How do you change the username on here?
    14·1 answer
  • Why is technology potentially important to the banking industry? What consumer needs does it fulfill?
    15·1 answer
  • Which combination of factors would result in the lowest monthly mortgage payment?
    9·2 answers
  • Students at a university are working on a project. the project involves many computing systems working together on disjointed ta
    9·2 answers
  • Which of the following is considered a white collar crime?
    13·1 answer
  • A student is conducting an experiment in which he adds an inhibitor to an enzyme-catalyzed reaction that contains alkaline phosp
    14·1 answer
  • Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,
    7·1 answer
  • DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/python
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!