1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
7

What is the full form of 'Rom​

Computers and Technology
2 answers:
slega [8]3 years ago
5 0

Answer:

It's full form is Read Only Memory.It is non-volatile memory because the data stored in it doesn't get cleared while the computer is switched off.

Nuetrik [128]3 years ago
3 0

Answer:

Read-only memory

Explanation:

Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

You might be interested in
Add my sna-p dkarpik58?...
BARSIC [14]

<u><em>This is for answers not snap</em></u>

7 0
3 years ago
When microsoft introduced its zune mp3 player, many people thought it would capture the mp3 player market by pricing its product
SSSSS [86.1K]
Your answer would be:  P<span>redatory Pricing .</span>
8 0
3 years ago
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
Sorting and filtering are two ways to _____ data.
Tamiku [17]
Store data. do you have options?
6 0
4 years ago
Read 2 more answers
Which of these statements regarding mobile games is true?
SashulF [63]

Answer:

A. They are typically played in doors.

Explanation:

Most logical answer

8 0
3 years ago
Read 2 more answers
Other questions:
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated b
    11·2 answers
  • What i have to care about transmitting data packet from one controller to other controller?
    8·1 answer
  • during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
    7·1 answer
  • Grace Hopper led the development of ______, a programming language for business applications.
    6·2 answers
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • Describe FIVE distinct features of multi-threaded programming. Your answer should be language independent. g
    9·1 answer
  • Briefly describe the traditional definition of the digital divide. What is it and who is affected, positively and adversely? How
    15·1 answer
  • The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letter
    12·1 answer
  • you want to upgrade your windows 10 professional computer to windows 11 professional. you begin by checking the hardware and dis
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!