1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
13

Write: In a five-paragraph essay that is two to three pages in length, address the

Computers and Technology
1 answer:
brilliants [131]3 years ago
4 0

Why are you asking other people to answer a question about something that's affected <u>you?</u>

You might be interested in
The following pieces are known as (image shown above)
cestrela7 [59]

Answer:

Conjunction operators  

Explanation:

4 0
3 years ago
Read 2 more answers
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
What type of block start a sequence?
ss7ja [257]

Answer:

An algorithm?

8 0
3 years ago
The feedforward part of the conversation should do all of the following except __________.a.identify the toneb.introduce the pur
polet [3.4K]

Answer:

give leave taking clues

Explanation:

The feed forward part of the conversation should do all of the following except <u>give leave taking clues</u> a identify the tone introduce the purpose give leave-taking clues establish a time-frame

3 0
3 years ago
Other questions:
  • THE DOMAIN IN AN EMAIL MESSAGE TELLS YOU THE
    11·1 answer
  • An email can lead to miscommunication because:
    6·2 answers
  • // This pseudocode should create a report that contains an
    14·1 answer
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a s
    6·2 answers
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • Function _one(array)
    6·1 answer
  • Please help thank u!!!!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!