1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
4 years ago
5

Which components in your computer store data?

Computers and Technology
2 answers:
tresset_1 [31]4 years ago
6 0

Answer:

mother board hope this helps

Annette [7]4 years ago
3 0

Answer:

The motherboard

Explanation:

The motherboard stores memory and is in the cpu. It stores all the file and data

You might be interested in
Write a function, called valFrequency, that given a list of values as a parameter, counts the frequencies for each value in the
Marat540 [252]

Answer:

pray for me i fell sick

Explanation:

i ate a piece of carrot now im blind

7 0
2 years ago
You are an inexperienced excel user and don���t know how to create your own formulas. you want to use one of the preconfigured f
Alexxandr [17]
A. click the insert formula icon on the formulas tab ribbon.
5 0
4 years ago
Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
mojhsa [17]

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

8 0
3 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?
o-na [289]

Answer:

I think the answer is 2.

hope it will help you

4 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that asks how many tickets for each class of seats were sold, then displays the amount of income generated from
    10·1 answer
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • Sheila is using a process of saving files to her desktop and then renaming them. She is
    13·2 answers
  • Which of the following statements is true?
    8·2 answers
  • One of Kyle’s clients called to complain that his computer was running really slow. Kyle went to the client’s work area and star
    6·1 answer
  • Which of the following protects intellectual property?copyright
    9·2 answers
  • Which of the following is NOT an example of application software?
    8·1 answer
  • Which of the following bit value represent -5 in two's complement notation?
    5·1 answer
  • A higher resolution image will mean a?
    13·2 answers
  • How does abstraction make programming languages easier to use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!