1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
12

The __is the temporary storange location for text when it is cut from a document

Computers and Technology
1 answer:
enot [183]3 years ago
3 0
The informal answer to your question is "clipboard". However, there isn't such a thing as the "clipboard". The people who came up with the idea of the clipboard use that nomenclature to describe the location in memory where that copied data resides. So the formal answer to your question is memory or RAM.
You might be interested in
A truth table with three inputs has how many switch combinations?
Pie
Three inputs have 8 possible states.
Here they are:

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1

7 0
3 years ago
A computer lab is an example of what type of network
alexandr402 [8]

computers i think i dont sounds right to me

4 0
3 years ago
Choose the term that best matches the definition.
Y_Kistochka [10]

Answer: it’s network protocol

Explanation:

4 0
3 years ago
) Consider a router that interconnects four subnets: Subnet 1, Subnet 2, Subnet 3 and Subnet 4. Suppose all of the interfaces in
erik [133]

Answer:

Check the explanation

Explanation:

223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.

The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000

Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)

So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26

Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)

and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25

Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)

So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28

4 0
3 years ago
What are the consequences of having unprotected Linux operating systems installed on embedded systems?
Gennadij [26K]

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

6 0
3 years ago
Other questions:
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    14·1 answer
  • Who was the creator of the game Fnaf?
    11·2 answers
  • Part of preforming routine computer maintenance includes
    9·2 answers
  • Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
    7·1 answer
  • Draw a flow chart that accepts mass and volume as input from the user. The flow chart should compute and display the density of
    8·1 answer
  • Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the u
    12·2 answers
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • question 1 scenario 1, question 1-5 you’ve just started a new job as a data analyst. you’re working for a midsized pharmacy chai
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!