1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
5

Question # 4

Computers and Technology
1 answer:
natka813 [3]3 years ago
4 0

Answer:

class

Explanation:

edg2020

You might be interested in
It is very easy to change data into charts<br> what is a Microsoft Excel Microsoft Outlook or both​
Vadim26 [7]
It’s microsoft Excel
8 0
3 years ago
Why is primary storage important
zepelin [54]

Answer:

What is primary storage?

A primary storage device is a medium that holds a memory for short periods of time while a computer is running. Although it has a much lower access time and faster performance, it is also about two orders of magnitude more costly than secondary storage.

A primary storage device may also be referred to as internal memory, main memory, main storage, and primary memory.

Why is primary storage important?

Primary storage provides fast access to the CPU, which allows active programs to deliver optimal performance to the end-user. Speed and usefulness aside, the fact that the loss of power means the loss of data makes RAM a short-term storage solution. In fact, it’s lack of long-term viability is the reason it makes sense to save your progress when working in one program or another.

3 0
3 years ago
Hi im new and would like you to answer​
soldier1979 [14.2K]

Answer:

Explanation:yes

7 0
4 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
The underlying color of a slide.
hichkok12 [17]
Background would be your answer :)
5 0
3 years ago
Other questions:
  • An electronic resume is a plain-looking document. True of False?
    6·2 answers
  • The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
    6·1 answer
  • You can access decorative underlines and change their color through the ____ drop-down.
    8·1 answer
  • the part of the computer that contains the brain , or central processing unit , is also known the what ?
    12·1 answer
  • Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sen
    14·1 answer
  • Given a string variable s that has already been declared, write some code that repeatedly reads a value from standard input into
    12·1 answer
  • Which of the following is a definition of a conventions
    8·2 answers
  • Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
    6·1 answer
  • Big data are used to _____. Select 3 options.
    5·1 answer
  • PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!