1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
12

A common type of non-volatile memory is _____.

Computers and Technology
1 answer:
lilavasa [31]3 years ago
7 0
SD? RAM? What are you getting at here????
You might be interested in
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
Are principles which allow designers to create blank designs
Lady_Fox [76]

Answer:

Seven principles guiding blank design

see below

Explanation:

The correct question should be What Are principles which allow designers to create blank designs

"Are principles which allow designers to create blank designs"

Blank design first screen user is presented with when about to start something new.

The seven principles are

  • Balance
  • Rhythm
  • Pattern
  • Emphasis
  • Contrast
  • Unity
  • Movement
7 0
3 years ago
What is after Windows 8.1
MAVERICK [17]

Windows 10. The most well-known Windows operating systems are Windows 7, 8, and 10.

7 0
3 years ago
Read 2 more answers
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
OleMash [197]

Answer: EMI(Electromagnetic interference)

               RFI(Radio frequency interference)

Explanation: Electromagnetic interference is the emission of the electromagnetic signal that can disturb the working of the other device.It invokes the disturbance that can create error, under-performance mechanism,distortion etc in the equipment.

Radio-frequency interference(RFI) is the radio-frequency signal that interferes the other device by creating noise and distortion. This leads to breaking of the operation and data error.

Other options are incorrect because cross talk is referred as undesired communication between signal ,attenuation is the degradation in the  amplitude of any signal and extended length of cabling is increasing the length of the cable.Thus the correct answer is RFI and EMI.

4 0
4 years ago
You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation
kompoz [17]

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

4 0
3 years ago
Other questions:
  • Reading is the process of transferring data, instructions, and information from memory to a storage medium.
    15·1 answer
  • A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
    8·1 answer
  • Assume that the following table is created and stored in your database:
    5·1 answer
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·2 answers
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • What is an undirected graph?
    13·1 answer
  • A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane
    15·1 answer
  • Select the correct answer.
    12·2 answers
  • OkkKkkkkkEYEYYEYEYEY BYEYYEYEYEyeeyeyyeEYEy if you know you know
    11·1 answer
  • For the function below, list 4 ordered pairs for that function.<br> y = 3x + 1
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!