1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
9

"Memory refers to: A.the brain processes involved in the encoding, storage, and retrieval of information. B.the mechanisms drivi

ng reasoning, decision making, and problem solving. C.a relatively permanent change in behavior resulting from experience. D.the process of growth and change across the lifespan."
Computers and Technology
1 answer:
natali 33 [55]3 years ago
8 0

Answer: A

Explain:

you can use memory on a computer to retrieve passed data if your referring to brains memory that is memory of passed events

memory:1 the faculity by which the mind stores and members information

2 something remembered from the past a recollection

You might be interested in
When you open a program, the hard drive___
Papessa [141]

Answer:

When you open a program, the hard drive <u>Registers the program and runs the program accordingly. </u>

I hope this helped!

3 0
3 years ago
What animal is perry the platypus ​
valkas [14]

Answer: Agent P or simply Perry

Explanation:

4 0
3 years ago
Read 2 more answers
Who invented Computer? Answer Differently​
FinnZ [79.3K]

Answer:

Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. He is considered the "father of the computer". He invented the first mechanical computer in the early 19th century.

Explanation:

plz make me as a brainliest frd

8 0
2 years ago
Read 2 more answers
Convert to binary 140
Ber [7]

00110001 00110100 00110000

5 0
3 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • _____ create computer programs by using their knowledge of computer science, math, and other disciplines.
    11·1 answer
  • Which of the following statements is true regarding the e-mails that were collected from Marina and Rita's Cupcakes' key employe
    11·1 answer
  • The continue statement _________.
    11·1 answer
  • Who can help me on my school we will to google meet and i share my screen
    5·1 answer
  • What is the effect of persistence of game worlds in social video games?
    14·2 answers
  • Write short notes about monitor printer and speaker​
    14·2 answers
  • Match the elements used in web searches to their functions.
    12·1 answer
  • What Does The Computer Monitor Contain?
    8·1 answer
  • Explain why you would use the soft on/off jumper when working on ATX system
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!