1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
2 years ago
12

Using hard disk to temporarily store data or instructions from ram is referred to as the

Computers and Technology
1 answer:
Lena [83]2 years ago
8 0
Your answer should be the memory because software will place instructions for the RAM to send to your storage hard disk for virtual memorizing to send to the CPU for processing.
You might be interested in
Anyone who know hacking​
Anton [14]

Answer: my best friend does her instgram is

user9294586

3 0
2 years ago
To give your app users the ability to open your app directly from other apps by clicking a link, you should use:.
pickupchik [31]
<span>To give your app users the ability to open your app directly from other apps by clicking a link, you should use:  deep link. With the deep link and its URL functionality, existing app users are driven directly inside the mobile app itself. 
</span>Deep links are usually made up of two parts: a scheme (part of the link that identifies which app to open).<span>and a </span>host and path (<span>the unique location in the app where your content exists).</span>

7 0
2 years ago
3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
Georgia [21]
Classes called child classes or subclasses inherit methods and variables
4 0
2 years ago
Explain briefly the use of the computers in the advertising area​
olya-2409 [2.1K]

Answer:

Brainly.con

Explanation:

5 0
2 years ago
I love science its my favorite subject
Charra [1.4K]

Answer:

Nice!

Explanation:

i like physics and biology :)

4 0
2 years ago
Read 2 more answers
Other questions:
  • Following a company on likedin is most similar to
    8·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • Given the following code segment, what is output after "result = "? int x = 1, y = 1, z = 1; y = y + z; x = x + y; cout &lt;&lt;
    7·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • Match the installation type to its description.
    9·1 answer
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • Draw AND, OR, XOR and XNOR gates with truth table and logic gates.<br><br>.​
    11·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
  • What is used for risk response control?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!