1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
14

Its made up of a small memory chips on a card that can hold data in an electronic format​

Computers and Technology
1 answer:
valina [46]3 years ago
4 0

The chip can allow you to have more data and more pictures so your phone does not become slow and messages and apps and more.

You might be interested in
What is printed to the console?<br> console.log(15 % 4);<br><br> 1<br><br> 2<br><br> 3<br><br> 4
Radda [10]

Answer:

3

Explanation:

7 0
3 years ago
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
Once a business determines that change needs to occur, what ahould the
Lady bird [3.3K]

Answer:

D. Business strategy

Explanation:

Kono Dio Da!!

7 0
3 years ago
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
ira [324]

Answer:

Pluggable authentication modules (PAM).

Explanation:

These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.

6 0
3 years ago
Convot the following biliary number into decimal form using any method ? (1010.100)2
Temka [501]

Answer:

10.5

Explanation:

1010.1

Handy method you can find searching google images, and I originally learned

from some guy teaching an online java course.

.1 --> 1 * 2^(-1) = 0.5

0 --> 0 * 2^(0) = 0

1 --> 1 * 2^(1) = 2

0 --> 0 * 2^(2) = 0

1 --> 1 * 2^(3) = 8

0.5 + 2 + 8 = 10.5

If for some reason it isn't very clear, just take the number, (x) and multiply it

by two to the power of the position it is in. (e.g. first number before decimal point is 0, second 1, etc).

3 0
3 years ago
Other questions:
  • All formulas that begin with =IF will
    5·1 answer
  • Harry needs to use a type of graph in a spreadsheet to show variations in data over a specific period. What type of graph or cha
    11·2 answers
  • Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven line
    8·1 answer
  • What is anatomy of software house?
    10·1 answer
  • Which library research databases include information about articles published in magazines, journals, and newspapers? question 1
    7·1 answer
  • The process in which a server is partitioned into smaller components virtually.
    9·1 answer
  • Could someone please help?​
    10·1 answer
  • Need answer ASAP.
    8·1 answer
  • Here’s my last question
    12·2 answers
  • PLEASE HELP!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!