1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
7

I need help, whoever gets it correct will get brainliest

Computers and Technology
1 answer:
Alexxx [7]3 years ago
7 0
The read-write type of memory helps in reading as well as writing data. This computer memory is used by users to continually update the data (to access (read from) or alter (write to) ) that is held on hardware storage devices.
You might be interested in
Complete the sentence.<br> A text messaging application is an example of a _____ application.
Ne4ueva [31]

Answer:

chat application

Explanation:

3 0
3 years ago
Read 2 more answers
What is computer and example<br>​
otez555 [7]
Computer
a machine that processes information under the control of a program

Example(s)
(First Electronic Computer) The Electronic Numerical Integrator and Computer (ENIAC)
PC (Personal Computer)
Desktop
Laptop



Hope this helps!
7 0
3 years ago
Select the correct statement(s) regarding IP addressing.
natima [27]

Answer:

the answer is B

Explanation:

4 0
3 years ago
Read 2 more answers
Please Help Fast!!!!!! Brainliest for First to answer!!! Conflict resolution is the process of solving disputes and disagreement
MaRussiya [10]
It's true............
8 0
3 years ago
a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public
expeople1 [14]

Answer:

The answer is "Blended Threat"

Explanation:

In the given question some information is missing that is the option of the question, which can be described as follows:

a. Firewalls.

b. Mirror disc.  

c. Threat from the backdoor.

d. blended threat.  

It includes bugs malicious content like malware, grubs, and many other scripts. It helps in remembering things when you combine multiple tasks in a processor to help learn, Its combination of stuff is produced, and other choices were false that can be described as follows:

  • In option a, It provides security to malicious, that's why it is wrong.
  • In option b, It is part of storage system, that's why it is incorrect.
  • In option c, It bypasses the normal security system, that's why it is wrong
8 0
3 years ago
Other questions:
  • The processing of data in a computer involves the interplay between its various hardware components.
    9·1 answer
  • Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
    8·1 answer
  • Please as soon as possible
    13·1 answer
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • These are templates or patterns that make it easier for users to enter data
    8·1 answer
  • Which feature is used to help identify the appropriate content for particular form fields?
    9·1 answer
  • Once you turn 18, if you choose one of the 4 options for accessing credit, how will you be sure you use that credit responsibly?
    12·1 answer
  • The U.S. consumes lots of energy. Which fuel provides the most energy?
    15·2 answers
  • 90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
    14·2 answers
  • Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!