1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
4 years ago
11

_______ consists of expensive and very fast memory chips that store the data or instructions that the CPU will look at next.

Computers and Technology
1 answer:
kirill115 [55]4 years ago
7 0

Answer:

I think its RAM memory

Explanation:

You might be interested in
Select the correct answer.
Zielflug [23.3K]

Answer:

motherboard

Explanation:

because is the main component of the computer

8 0
3 years ago
List the step in turning on a computer
kondaur [170]
On the CPU first and then then the power button if there is password access then u have to type the password
this Much only
hope it helps :)
7 0
4 years ago
When a primary key combines two or more fields, it is called a ____ key?
Tanya [424]
<span>When a primary key combines two or more fields, it is called a ____ key
the answer is Constructed key</span>
6 0
3 years ago
How would you identify communication equipment?
eimsori [14]

Answer

Explanation:

There should be more context to this question but I would say there is a variety of things that could be seen as communication equipment, such as email, telephone, voice message, through mail.

6 0
3 years ago
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
Other questions:
  • What is the first stage of perception
    6·2 answers
  • Jamie works on a spread sheet in which he has to label stes of data. How can he navigate between the cells in the spread sheet
    8·1 answer
  • The largest distribution of software cost will be when in the programs life cycle?
    12·1 answer
  • _____ is a software delivery approach in which an organization outsources the equipment used to support its data processing oper
    5·1 answer
  • Francis has created a new program. However, Francis used some objects from another program to run methods in the current program
    14·2 answers
  • Language/Type: Java ArrayList Collections
    6·1 answer
  • When is the kids choiceee awads?????????????????????????
    12·2 answers
  • Which among the following if absent, a computer is not complete.
    6·2 answers
  • Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type
    15·1 answer
  • Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!