1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
3 years ago
13

What is the use of ROM chip in computer system?​

Computers and Technology
1 answer:
andrezito [222]3 years ago
8 0

Answer:

ROM stands for read-only memory. It's used to store the start-up instructions for a computer, also known as the firmware. Most modern computers use flash-based ROM. It is part of the BIOS chip, which is located on the motherboard.

You might be interested in
Any executable files???
Kipish [7]

Doesn't look like there are any..

7 0
3 years ago
Assume that you have 22 slices of pizza and 7 friends that are going to share it (you've already eaten). There's been some argum
xz_007 [3.2K]

Answer:

In Python:

numberOfWholeSlices = int(22/7)

print(numberOfWholeSlices )

Explanation:

For each friend to get a whole number of slices, we need to make use of the int function to get the integer result when the number of slices is divided by the number of people.

So, the number of slice is: 22/7

In python, the expression when assigned to numberOfWholeSlices  is:

numberOfWholeSlices = int(22/7)

Next, is to print the calculated number of slices

print(numberOfWholeSlices )

4 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
4 years ago
You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has
posledela

Answer:

Extend a Volume:

1. in the lower left-hand corner, R click the start page thumbnail and select disk management

2. if needed, click ok to initialize any new disks.

3. R click the volume and select extend volume.

4. click next.

5. for the system volume, you can only extend the volume onto the existing disk. type the amount of disk space to add to the volume and click next. click finish.

Convert a Disk to Dynamic

1. In Disk management, R click the disk and select convert to Dynamic Disk

2. Select the disk to convert, click ok.

3. Click convert

4. If the disk contains a volume, you will be shown a warning message. Click Yes to continue.

Create a Spanned Volume

1. In disk management, R click a disk or free space on a disk and select New Spanned Volume.

2. Click Next

3. Select the disks that will be part of the spanned volume and click Add. You must select at least 2 disks to create a spanned volume.

4. To modify the amount of space used on a disk for the new volume, select the disk in the right box, and then edit the number in the select the amount of space in MB: field.

5. Click next

6. Select the drive letter and click Next

7. Type the volume label, then click next

8. Click finish

9. If the new volume includes a space from a disk that is currently a basic disk, you will be prompted to convert the disk to a dynamic disk. Click Yes to create the volume.

Explanation:

5 0
3 years ago
To use patterns and observations to say what happens next
posledela
You would need to show a pic
4 0
3 years ago
Other questions:
  • When sociologists say that it is difficult to predict all the results of social change, what are they referring to?
    5·1 answer
  • To create a chart you need to select at least ___ in a range of data
    15·1 answer
  • Use the image above to determine which toolbars will be displayed in the program you are using. SELECT ALL THAT APPLY
    11·2 answers
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    12·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • 18. Applying what formatting option to your Excel workbook will make it easier to read when printed out?
    9·1 answer
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • Why computer process faster than humans?​
    10·2 answers
  • Can someone help me?
    10·1 answer
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!