1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
4 years ago
12

Match the definition with the corresponding word

Computers and Technology
2 answers:
babunello [35]4 years ago
8 0

have you already completed this ?

Oksana_A [137]4 years ago
4 0

Answer:

Ram is your memory

that's all i know

You might be interested in
Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
MariettaO [177]

Answer:

Try to use your mobile data but it might use up quite a bit. Also instead of downloading it transfer it to a laptop or a usb stick, or you can upload your photos to the cloud.

6 0
3 years ago
BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
ch4aika [34]

Answer:

yes. it is true. mark as brainlest

8 0
3 years ago
You will need to convert the following binary numbers to hexadecimal. Table 1 contains 16 problems. The first one is completed f
pantera1 [17]

Answer:

where is the table pls.........???..????

5 0
3 years ago
Which utility would you use to test communication on your own computer using your ip address as a parameter?
olganol [36]
Ping and traceroute locally and on a remote server. Locally it will tell if you local setup is correct and to test your network communication it needs to travel over a network.
5 0
3 years ago
How can i save a word 2016 document as a word 2016 document?
Lana71 [14]
Type 2016 document.pdf.files
3 0
3 years ago
Other questions:
  • Prompt the user for a string that contains two strings separated by a comma. (1 pt)Examples of strings that can be accepted:Jill
    5·1 answer
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    12·2 answers
  • You have found an old dusty computer in your basement that you can identify as an original IBM PC. You ask your friend if he kno
    13·1 answer
  • Each computer or device on a network is called a(n) ______.
    7·1 answer
  • . The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turni
    14·2 answers
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • A business traveler notices there is an extra connector between the keyboard and the computer, in a business center. She has mos
    12·1 answer
  • How to interchange first half of the array with second half of array in python?
    9·1 answer
  • What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!