1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
4 years ago
10

What memory stores instructions that tell the computer how to start up?

Computers and Technology
1 answer:
frozen [14]4 years ago
7 0
ROM, or Read-Only memory.
You might be interested in
The Circular Flow Model includes serveral actors. Which of the following is NOT listed in the Circular Flow Model?
Ierofanga [76]
I believe it would be Charities

4 0
3 years ago
While it might be considered "old-school," which action should you take if you are unsure how a page will print, even after look
coldgirl [10]

Answer:

The correct answer is D

4 0
3 years ago
Which console was the first to use CD-ROM storage
Anika [276]
1989 - philips CDi / FM Towns
1991 - Sega MegaCD (genesis CD) / Commodore CDTV / FM Towns Marty
1993 - 3DO / CD32
1995 - Sega Saturn / Sony Playstation
1997 - Projected date for 3DO's M2 but was shelved afaik
1999 - Nintendo Gamecube / Sega Dreamcast / Sony Playstation2
2002 - Microsoft Xbox
2004 - Nintendo Wii
2005 - Microsoft Xbox360
2006 - Sony Playstation3__________________
<span>
A500 GVP530
A600 Vampire-ized!
A1200 BlizIV030scsi
A1200 Bliz040scsi
A1200 BlizPPC/040/scsi/BvPPC
A3000 CybIII060
A4000 C=040
CD32</span>
5 0
4 years ago
Which of the following is NOT a major feature of safety and health programs? A. Assess cultural costs B. Hazard prevention and c
aleksandrvk [35]
A. assess cultural costs. they wont help anyone if they have a safety or health issue. hope this helped

8 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Other questions:
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • Assume that x is a char variable that has been declared and already given a value . write an expression whose value is true if a
    8·1 answer
  • 40 points to answer ALL
    9·2 answers
  • For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions)
    13·1 answer
  • Which of the following is NOT a goal of a Material Requirements Plans (MRP)?
    12·1 answer
  • Which is the fastest CPU and why?
    5·1 answer
  • What is the web page path on the web server for the URL:
    12·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
    11·1 answer
  • How do we calculate the BMI in python? <br> the formula is kg/m²
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!