1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
14

Programs and data that are stored on a motherboard are referred to by what term?

Computers and Technology
1 answer:
dezoksy [38]3 years ago
8 0
The correct answer is usually referred to as 'firmware'. 
You might be interested in
: Write a function "def countWords(string)" that returns a count of all words in an input string represented by the variable 'st
Zina [86]
We can define a word as a group of characters without a space between them. To find the words of the input string , w can use split(delimiter) which returns a list of strings which had the defined delimiter between them in the input string.

def countWords(string):
words = string.split(" ")
count = len(words)
return count

Here we set the delimiter as the space character, and returned the length of the words list. I split each step into its own line for readability, however the function could be one line:

return len(string.split())

Here, no delimiter is specified. If one isn't given, it will default to split at any whitespace, including space.

3 0
3 years ago
HAS ANYONE HEARD OF THE GAME SCHOOL DAY
Musya8 [376]

Answer:

NO BUT IT SOUNDS FUN

Explanation:

I PROBABLY HAVE NOT HEARD OF IF BC IM HOMESCHOOLED :D

3 0
3 years ago
A network administrator had his entire network converted into a botnet. Which type of malware infection is most likely responsib
Scorpion4ik [409]

Answer:

worm

Explanation:

Computer worm -

It is a malware program which is illegally or secretly added to the system of the host computer , and then further multiplies and spread to other computer , is known as a computer worm.

Worm can very cause a huge harm to the network of the computer.

Hence, from the given scenario of the question, the correct term for the given information is computer worm .

5 0
3 years ago
What is local area network​
otez555 [7]

Explanation:

local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network not only covers a larger geographic distance, but also generally involves leased telecommunication circuits.

<em><u>hope</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>helps</u></em>

3 0
3 years ago
Read 2 more answers
Major innovation made from establishment of abacus to the development of fifth dev of computer generation
expeople1 [14]

<u>Explanation</u>:

The establishment of the Abacus brought about one of the first counting device (calculator). This device was a mechanized computer that supported numeric calculations. However<u>, the process was entirely manual and mechanized. </u>This innovation led to;

First-generation  of computers, although not entirely manually operated like Abacus, made use of vacuum tubes, were very big in size and could store only a small amount of information.

Second Generation of computers unlike the first generation that uses vacuum tubes, this one came with new technology; the use of transistors. The computers were smaller in size than vacuum tubes.

Third Generation  computers made use of IC (Integrated circuits) for the first time. Contained higher storage capacity and was more reliable than previous generations.

Fourth Generation computers became known as the personal computer generation. This generation brought the use of personal computers on a personal level as they use microprocessors, was easy to carry about, had larger storage capacity and faster speed of operations.

Fifth-generation of computers is known as the age of artificial intelligence. These computers were programmed with the ability to make decisions just like a human being would.

7 0
3 years ago
Other questions:
  • Which of the following people choose a career path for the right reasons
    12·2 answers
  • In an array based implementationof a queue a possible solution to dealing with the full condition is to
    14·1 answer
  • What does RFID use for wireless communication?<br> Infrared<br> IoT<br> Smart chip<br> Tag
    14·1 answer
  • Mac or PC (need opinions please)<br><br> Why did you choose Mac/PC?
    10·2 answers
  • The _____ option will require users to have a password to access the document.
    10·2 answers
  • Introduction to Identity and Fitting In
    7·1 answer
  • Rtjfifjjir<br> jhjjbkjkjjgggjhvhjvhf
    9·1 answer
  • Please help me please it's urgent​
    6·1 answer
  • What is printed when the following code has been executed?
    9·1 answer
  • Yusuke has been a fan of online games for as long as she can remember. She particularly loves the role-playing games that allow
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!