1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
3 years ago
7

Describe PROM, EPROM and EEPROM memories​

Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
7 0

Answer:

Explanation:

PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.

You might be interested in
When you’re in the Normal view, what are the visible panes?
zheka24 [161]

a

pleas give branlest

6 0
2 years ago
Read 2 more answers
Write code that declares a variable named minutes, which holds minutes worked on a job,
Mamont248 [21]

The code that carried out the functions indicated above is stated below. It is not be noted that the code is written in C#

<h3>What is C#</h3>

C# is a type-safe, object-oriented programming language. It is pronounced "see sharp"

<h3>What is the code for the above task?</h3>

Using System;            

public class HoursAndMinutes

{

   public static void Main()

   {

      // declaring minutes variable and assigning 197 as given in question

       int minutes = 197;

     // outputing the total minutes , hours

       Console.WriteLine("{0} minutes is {1} hours and {2} minutes.", minutes, minutes/60, minutes%60);

   }

}

// OUT

Learn more about C#:
brainly.com/question/20211782
#SPJ1

8 0
1 year ago
The buttons on a specific tab are organized into logical Ribbons. <br> T<br> F
NeTakaya
I believe the answer would be true
8 0
2 years ago
Read 2 more answers
What must you be careful of when retrieving messages/data from mobile devices in public?
pochemuha

We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.

7 0
2 years ago
When saving a memo you created in Word, which of the following extensions is automatically assigned to the document?
Lena [83]
.docx is the default file extension on a Word doc.
6 0
3 years ago
Read 2 more answers
Other questions:
  • One metric ton is approximately 2,205 pounds.
    6·1 answer
  • Deon is required to provide the citation information for his sources. What type of information should he collect from his source
    10·2 answers
  • A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
    14·1 answer
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • Name two ways you can identify the pid number of the login shell.
    13·1 answer
  • mr. Jones put the same amount of soil around each of the five plants he has six bags of soil how many bags of potting soil did m
    14·1 answer
  • Help please! Coding!
    9·1 answer
  • 14. Which of the following is NOT likely to be one of the future development gaming industry?
    7·1 answer
  • Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
    5·1 answer
  • 1. Keisha is in her first semester of college and is taking 10 credit hours: ACA 122, CIS 110, PSY 150, and developmental math.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!