1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
2 years ago
10

The auxiliary device used to store large volume of data and program for future is called​

Computers and Technology
1 answer:
3241004551 [841]2 years ago
4 0

Answer:

Auxiliary memory units are among computer peripheral equipment. They trade slower access rates for greater storage capacity and data stability. Auxiliary memory holds programs and data for future use, and, because it is nonvolatile (like ROM), it is used to store inactive programs and to archive data.

Explanation:

hope the answer was helpful...

You might be interested in
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
How are gems and precious metals similar?
Ierofanga [76]
The answer would be d they are both rare and valuable minerals
7 0
2 years ago
Read 2 more answers
Which of the following URL extensions indicate the website is used by the United States government? .org .gov .col .edu
lakkis [162]

Answer:

gov

Explanation:

i think?? lol

8 0
2 years ago
Read 2 more answers
HELP PLEASEEEE!!!!!!!
Lubov Fominskaja [6]
This is too little points for a question I’m sorry.
8 0
2 years ago
HELP PLEASE!
nasty-shy [4]

Answer:

It probably is fake. Send me a screenshot. Also, just saying if it asks you to download a app of something, dont do it its just a scam to make you panic.

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which devices are often used inside of tablets to store data on these devices?
    15·1 answer
  • loop Write a program to read a list of exam scores given as integer percentages in the range 0 to 100. Display the total number
    5·1 answer
  • Which soft skill involves the ability to work harmoniously with your colleagues and improve productivity?
    14·1 answer
  • Chelsea wants to know about the requirements for being a lab technician. Where could she find that information?
    9·1 answer
  • A package delivery company or a cell phone company wouldn't go far if it could not deliver products smoothly and reliably. This
    15·1 answer
  • Identify any eight new programming languages and classify them based on their functionality.
    14·2 answers
  • 7.2 code practice edhesive
    11·2 answers
  • Classify the following as cross-section or time-series data: Gross sales of 200 ice cream parlors in July 2009
    8·1 answer
  • ______________________ can run on a workstation or server and is at the heart of all business applications.
    7·1 answer
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!