1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
8

A. What sectors are used with Foo?

Computers and Technology
1 answer:
postnew [5]3 years ago
7 0
D the sectors are used with foot
You might be interested in
With simple segmentation, a process is divided into a number of segments that need not be of equal size. When a process is broug
hoa [83]

Answer:

The missing word is <em>backing store.</em>

Explanation:

A backing store is a device for secondary storage of data that typically has greater capacity than the primary store but is slower to access.

A process must be loaded into memory in order to execute.

If there is not enough memory available to keep all running processes in memory at the same time, then some processes who are not currently using the CPU may have their memory swapped out to a fast local disk called the backing store.

The backing store may be the Hard Disk Drive or a Universal Serial Bus Drive.  The backing store can sometimes be referred to as <em>virtual memory.</em>

This memory that appears to exist as main storage although most of it is supported by data held in secondary storage, transfer between the two being made automatically as required.

Cheers!

4 0
3 years ago
For demultiplexing a UDP socket is identified by:_____.
Nikolay [14]

Answer:

1. Destination IP address

2. Destination Port number

Explanation:

Demultiplexing is a term that describes a procedure of transforming a signal that has multiple analog or digital signal flows into different initial and unconnected signals.

Hence, in this situation, the correct answer is that for the demultiplexing process, a UDP (User Datagram Protocol) socket is identified by both the destination IP address and destination port number

3 0
3 years ago
Name at least three classes to which each of these objects might belong:
deff fn [24]
Cooking class and history and the other one I don’t know
4 0
3 years ago
Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen
Leno4ka [110]

Answer:

I think it's "Carly will set the page to Page Width, and Rhianna would zoom to 150%." If Carly doesn't want to use the zoom thingy, then she probably would just change the page orentation (idk if I spelled that right). Rhianna wants to zoom in, so that's why I said that. It's either "A" or "C."

Explanation:

I hope this helps!

5 0
3 years ago
When describing a software lincense, what does the phrase "open source" mean?
NikAS [45]

Answer:

The phrase "Open Source" means that a program's source code is freely available and may be modified and redistributed.

Explanation:

Hope this helped :)

8 0
3 years ago
Other questions:
  • Your friends parents are worried about going over their budget for the month. Which explains would you suggest is not a need.
    14·2 answers
  • (Microsoft excel) The data selected to create a table must include
    6·2 answers
  • 2. To learn the proper way to set up a table of contents, editors can use a A. style manual. B. dictionary. C. grammar checker.
    15·1 answer
  • To collect data using Google Analytics, which steps must be completed? (select all answers that apply)
    9·1 answer
  • ​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
    10·1 answer
  • A claim that is printed and mailed to the carrier site is called a _______copy?
    13·1 answer
  • ________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of the
    5·1 answer
  • On net, is technology good or bad for society? Please explain, support your argument, I’ll mark brainliest
    9·2 answers
  • What software could i use to create music like Aphex Twin?
    6·1 answer
  • To defeat SQL injection attacks, a web application has implemented a filtering scheme at the client side: basically, on the page
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!