1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
10

Will give brainliest

Computers and Technology
1 answer:
Alex73 [517]3 years ago
5 0

Answer:

B

Explanation:

Im a 100% sure.

You might be interested in
Where does the computer store instructions and data that are needed frequently by the cpu?
Elden [556K]
L1 Cache

There other cache levels but the most frequently used data is put in L1d (d for data) and L1i (i for instructions).


3 0
4 years ago
You are going to create an Arduino sketch where you have two push buttons, one piezo, one
Elanso [62]

Answer:

asw

Explanation:

4 0
3 years ago
A working model of a new product for testing purposes.
kotykmax [81]
Prototype is a working model for a product only for  testing purposes
6 0
3 years ago
What type of database contains multiple collections of data that are related to one another cells
statuscvo [17]
The different types<span> of </span>databases<span> include operational </span>databases<span>, end-user </span>databases<span>, distributed </span>databases<span>, analytical </span>databases<span>, relational </span>databases<span>, hierarchical </span>databases<span> and </span>database<span> models. 

Source Bing</span>
7 0
3 years ago
Pls guys I need help fast my PC is new and it can't connect to a network
nata0808 [166]

Answer:

There are several reasons why your PC might not be able to connect to Wi-Fi. You should first make sure that your PC's Wi-Fi adapter hasn't been turned off, or needs to be reset. The issue might also be with the Wi-Fi, not your PC — make sure that it works on other devices.

8 0
2 years ago
Other questions:
  • When sending emails and setting goals, you want to go beyond checkpoints of activities for your goals. What are examples of chec
    12·1 answer
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • Describa las características más importantes de cada procedimiento,difencias entre si Procedimiento Bessemer Procedimiento Sieme
    15·1 answer
  • Identify a characteristic of electronic meeting systems.
    10·1 answer
  • If you created a variable called name, what data type would that value be?
    7·2 answers
  • HELP ASAP 50 POINTS AND BRAINLIST PLZ NO FAKE ANSWER I BEG!!!!!!!!!!!!!!!!!!!!!!!!!!
    15·2 answers
  • Does technology shape society or does society shape technology?
    14·1 answer
  • PLEASE HURRY!!!<br> Look at the image below
    5·1 answer
  • Why would a programmer use the logical operator or in an if statement? (5 points)
    14·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!