1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
14

Its made up of a small memory chips on a card that can hold data in an electronic format​

Computers and Technology
1 answer:
valina [46]3 years ago
4 0

The chip can allow you to have more data and more pictures so your phone does not become slow and messages and apps and more.

You might be interested in
We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination
Daniel [21]

Answer:

Option  A is the correct answer.

Explanation:

8 0
3 years ago
You can use predesigned, formatted files called _____ to create new worksheets quickly.
Leokris [45]
You can use predesigned, formatted files called -templates- to create new worksheets quickly.
8 0
3 years ago
What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster? Multip
sattari [20]

Answer:

The correct answer to the following question will be "Disaster Recovery as a Service (DRaaS)".

Explanation:

DRaaS seems to be a cloud services term used only to secure an infrastructure or data through human catastrophe or interruption of service at any destination by allowing a complete recovery throughout the cloud.

  • DR seems to be a security or management preparation field which seeks to protect an organisation from those in the consequences of major negative experiences.
  • This provides offsite backups which use storage resources to defend programs including assets from disaster-induced destruction.

8 0
3 years ago
Opinion on sandshrew​
Alex

Answer:Sandshrew is cute

Explanation:

3 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
    7·1 answer
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • Muultimedia Promo try answer this question and explaining them or give examples of that topic Thanks
    10·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache
    7·1 answer
  • Answer the questions about PowerPoint using the drop-down menus,
    15·2 answers
  • Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!