1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
10

The method for updating the main memory as soon as a word is removed from the cache is called

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
7 0
The method for updating the main memory as soon as word is removed from the cache is called write-back.
You might be interested in
How to see if your computer has bluetooth?
RUDIKE [14]
Assuming you're running Windows, click the start button, and then search for "Device Manager" (or open CMD or PowerShell and type devmgmt.msc). Look at the list of devices. If Bluetooth is there, you have it; if it's not there, you don't. 
3 0
3 years ago
Lisa granted the CREATE TABLE privilege WITH ADMIN OPTION to Sharon. Sharon granted the privilege to Bob. If Lisa’s privileges a
GuDViN [60]

Answer:

D

Explanation:

As it's not fair if they all lose there privileges

4 0
4 years ago
list three quantitative characteristic properties of water explain why they are considered characteristic
tia_tia [17]

Answer:

The three quantitative characteristic properties of water is explained below in detail.

Explanation:

The three quantitative components of water incorporate the following:

1.Freezing point:

The water has a freezing point of 0 degrees Celsius.

2. Boiling point:

The water has a boiling point of 100 degrees Celsius.

3. Melting point:

The melting point of ice is 0 degrees Celsius.

These properties are all uncommon to water. Being uncommon means that these characteristics are only noticeable in water; hence, they can be beneficial in recognizing such a substance.

5 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
How does ur computer know that its cursor moved
Anton [14]
The sensor of a mouse connected to the computer or the touch pad being touched and swiped around on
8 0
3 years ago
Read 2 more answers
Other questions:
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates wh
    14·1 answer
  • After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
    5·1 answer
  • What does “human-like” mean when we are talking about a machine?
    7·1 answer
  • Which statement best describes desktop publishing?
    10·1 answer
  • Uses of prototype and who made the prototype<br>​
    5·1 answer
  • Mario kart is mercedes lol
    13·2 answers
  • Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in
    7·1 answer
  • ______________ are used to store information that will be referenced and manipulated in a computer program. They label data with
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!