1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
4 years ago
13

On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on

them and can open them whenever he wants, these files are in fact very similar to the kind of information held in _____ memory.
Computers and Technology
1 answer:
enyata [817]4 years ago
5 0

Answer:

System

Explanation:

You might be interested in
Which key is used to indent the first line of a paragraph to the right?
Ivanshal [37]

That would be the tab key

4 0
3 years ago
Read 2 more answers
Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
marta [7]
If fhun gftrfjjtcbjjbsufcghtfghyrssfbkoire crazy ahh young man
7 0
4 years ago
Which of the following is a reason to use storyboarding? (Select all that apply)
fomenos

Answer:

To have all your ideas in one place

To conceptualize design ideas

To present ideas to a client

Explanation:

A storyboard refera to a graphic organizer which consists of images which are displayed in sequence in order to pre-visualise an animation, motion picture, etc.

It is important as it conveys how a story will flow, and also help in conceptualizing design ideas. Based on the options given, the correct options are:

• To have all your ideas in one place

• To conceptualize design ideas

• To present ideas to a client

3 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
Find the error in the following code fragment. int a: System.out.print(a):​
trapecia [35]

Answer:

If your using java, then its supposed to be "System.out.print("a")"    

Explanation:

its supposed to have quotations

7 0
3 years ago
Other questions:
  • Which of the following would you click to access Help and Support?
    6·2 answers
  • What symbol do we use to denote a character?
    9·2 answers
  • _____ creates a border or space that separates information.
    14·1 answer
  • What was the best Metal Gear Solid you enjoyed the most?​
    6·1 answer
  • Write an algorithm for a program which inputs the lengths a, b and c of the three sides of a triangle. The program then determin
    9·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • Name the three major functions performed by the computer.
    6·1 answer
  • All of the following are personal security safeguards except ________. Select one: A. send no valuable data via email B. Use htt
    12·1 answer
  • Write a simple program that takes in a numerator and denominator and then computes the GCD for that fraction. You can assume tha
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!