1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
7

When you open a program, the hard drive

Computers and Technology
2 answers:
r-ruslan [8.4K]3 years ago
5 0

the answer is c)loads into the RAM for high speed access.

Gnesinka [82]3 years ago
3 0

Answer:

That would be C

Explanation:

You might be interested in
Which business application uses location information to provide a service and is designed to give mobile users instant access to
statuscvo [17]

Answer:

The correct answer to the following question will be "Location-based services".

Explanation:

Location-based services are resources that are delivered via a cell phone to take into consideration the geographical location of just the user. It usually include entertainment or data.

  • This uses the technology of GPS from a smartphone to detect the location or the position of an individual if that individual has expressed a preference-in to enable the service to do just that.
  • The app will classify its search down to a physical address during a smartphone user chooses-in, without any need for automatic input of the data.

Therefore, it's the right answer.

3 0
3 years ago
What is a goal?
Luda [366]
A goal is an aim you want to achieve
Strategy is a plan to your achievement
Tactics are is an action carefully planned
A goal is important to be specific cuz it helps u focus on your specific task
5 0
3 years ago
Hot five was the famous band of which musician?
slega [8]
Hot Five was Louis Armstrong's first recording jazz band.
4 0
4 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
5 band resistor with two red bands, two gold bands, one purple band?
Mamont248 [21]

According to below picture, two gold bands on a 5 band resistor cannot happen. What is the order of the bands?

8 0
3 years ago
Other questions:
  • What are the latest technology in 2014
    11·1 answer
  • Long distances are usually measured in kilometers.<br> T or F?
    8·1 answer
  • An existing document that you use as a starting point for a new document; it opens a copy of itself, unnamed, and then you use t
    15·1 answer
  • E. what component must be compatible with every other component of the computer?
    15·1 answer
  • Student aid is based on either financial need or _____ need.
    12·2 answers
  • It is desirable to provide a degree of __________ __________ among classes so that one class is not adversely affected by anothe
    8·1 answer
  • Who first demonstrated the computer mouse ?
    11·1 answer
  • Create a class called StockTester that has the following fucntionality. a. Create a main method with an ArrayList named dataStoc
    9·1 answer
  • Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
    6·1 answer
  • _______ refers to the use of gps or rfid technology to create virtual boundaries that enable software to trigger a response when
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!