1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
5

What are the three basic storage of computer​

Computers and Technology
3 answers:
kaheart [24]3 years ago
7 0

Answer:

RAM,ROM ,Magnetic tape,

Explanation:

CD ROM,DVD ROM,

olga_2 [115]3 years ago
5 0

Answer:

hard disk drive, Rom and USB flash memory

Explanation:

I hope it helps you

allochka39001 [22]3 years ago
4 0

Answer:

RAM,ROM ,Magnetic tape,

Explanation:

CD ROM,DVD ROM,

You might be interested in
Two electronics technicians are looking at the testing instrument in the figure above. Technician A says that this instrument is
aleksklad [387]
I am pretty sure the answer is A.
4 0
3 years ago
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their
nika2105 [10]

Answer:

The problem would be the battery

Explanation:

The reason is becuse the battery might be bad or have a shortage in it hope this helps :) and good luck!

6 0
3 years ago
Project planning output is :
-Dominant- [34]

Answer:

A

Explanation:

The main output of Project palnning is project plan.

5 0
3 years ago
Ideally, Internet of Things (IoT) devices have the ability to:
Stella [2.4K]

Answer:

I believe the answer would be D

8 0
3 years ago
Other questions:
  • A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, t
    12·1 answer
  • What shooting position is commonly used when hunting with a shotgun?
    14·2 answers
  • . char values are surrounded by _____ quotes
    15·1 answer
  • Help me match these answers
    5·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • What are some good digital habits?
    5·2 answers
  • Which one you choosing? PS5 OR THE XBOX SERIES X???
    14·2 answers
  • The difference between page break and section brek​
    5·2 answers
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!