1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
10

Devices that allow for the retention of data when your computer has been shutdown

Computers and Technology
1 answer:
zepelin [54]3 years ago
4 0
That would be persistent storage devices (non-volatile memory)
- hard disk drives (mechanical)
- solid state drives (electronic / NAND flash)
- CD (optical)

If u need more I can give u a few more
You might be interested in
Can some please help me learn how to make a program via Binary Code?
padilas [110]
Look up binary code dictionary it will help you learn codes in letter of binary
8 0
4 years ago
A(n) ______________________________ is a camera mount that uses the concept of a lever and fulcrum and allows a camera to be rai
rewona [7]
Hey and thanks for giving me the chance to serve u
_________________tripod 
_______________
hope l helped
4 0
3 years ago
Which of these is not considered by economists to be a want?
KATRIN_1 [288]
Bowl of cereal these is not considered by economists
4 0
3 years ago
Processor speeds are in bytes.<br><br> True<br> or<br> False
Aneli [31]

Answer:

true

Explanation:

Mainly true, but partly false. There are two bits in a computer that supply speed: The processor (measured in hertz eg. 2Ghz Processor) and RAM (bits and bytes eg 2GB of RAM). The processor is more to do with the speed programs run and load at, and RAM let's you use lots of memory intensive programs at the same time, although this also comes down to the processor and vice versa. Hope I helped :)

5 0
3 years ago
Read 2 more answers
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
Other questions:
  • Write another function to convert a value to its word equivalent leveraging the following tuple - o Number = (‘One’, ‘Two’, … ‘N
    10·1 answer
  • What is an ISP?<br> in computer Networking
    11·2 answers
  • Please help ASAP, will mark brainliest!
    10·1 answer
  • 2) Show the decimal equivalent of each of the numbers if they are interpreted as (4 answers): 11001101 01101001 a. Unsigned bina
    15·2 answers
  • Write a method drivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar co
    12·1 answer
  • Which of the following are the benefits of using Responsive Display Ads?
    9·1 answer
  • Which two functions can be used with the math module?
    13·1 answer
  • PLEASE HELP!!<br> giving loads of points<br> create the python codes for the images
    5·1 answer
  • ....................
    5·1 answer
  • Nick is moving from Alabama to Texas. A friend of his remarked that Nick may have to pay higher taxes there. What is the cheapes
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!