1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
14

Brainliest Answer!!

Computers and Technology
2 answers:
olganol [36]3 years ago
6 0
The answer to your question is true
tia_tia [17]3 years ago
3 0
True. "RAM" allows computer storage data to use frequently used program instructions to increase the general speed of a system.<span />
You might be interested in
Choose the answer that best completes the statement.
Anestetic [448]
1. A - everything starts there
2. D - always
3. C - true
4 0
3 years ago
Read 2 more answers
Helppppppppppppppppppppppppppppppppp
Natalija [7]

Answer:

answer below

Explanation:

hope this helps

6 0
2 years ago
Read 2 more answers
A key or combination of keys that complete an action more efficiently than using the mouse is called a(n) keyboard shortcut.
andreev551 [17]
The answer to your question is true
6 0
3 years ago
Which orientation style has more height than width?
gayaneshka [121]

Answer:

"Portrait orientation" would be the correct answer.

Explanation:

  • The vertical picture, communication as well as gadget architecture would be considered as Portrait orientation. A webpage featuring portrait orientation seems to be usually larger than large containing lettering, memo abases as well as numerous types of content publications.
  • One such volume fraction also becomes perfect for impressionism depicting an individual from either the top.

Thus the above is the correct answer.

3 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
4 years ago
Other questions:
  • Complete the following sentence.
    13·2 answers
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • As the project manager for a software development project, you are helping to develop the project schedule. You decide that writ
    13·1 answer
  • Is a network where connected devices are located within the same building.
    5·2 answers
  • Why do nonprofit agencies include blogs on there website?
    10·1 answer
  • Implement (in Java) the radixSort algorithm to sort in increasing order an array of integer positive keys. public void radixSort
    13·1 answer
  • To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application lay
    8·2 answers
  • When you start a new blank document, you begin typing at the
    6·1 answer
  • What are three advantages of using enterprise software in an organization?
    10·1 answer
  • What is the difference between the dom api and the html dom api.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!