1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
10

How do we “read” and “write” in MAR and MDR memory unit, please help I am very confused :)

Computers and Technology
1 answer:
Nutka1998 [239]3 years ago
6 0

Answer:

No entiendo

Por favor traduce al español

You might be interested in
Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
victus00 [196]

Answer:

C. Generalization

Explanation:

The relationship between subclass and superclass is generalization. For example there will be generalization between the class Employee and class HourlyEmployee which inherits from it. All the other options are not suitable.

8 0
2 years ago
Which image file format consumes the most file<br> space?<br> 0<br> GIF<br> JPEG<br> PNG
gogolik [260]

Answer: jpeg becauuse itss correct

5 0
2 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A soft
zavuch27 [327]

Explanation:

i don't know

4 0
2 years ago
Why do we install doorbells in our house
Vinil7 [7]

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

6 0
2 years ago
Read 2 more answers
Other questions:
  • What is a social media networks
    5·1 answer
  • To paste text with the same formatting as the document in which it is entered, select _____ from the Paste menu. Keep Source For
    12·2 answers
  • An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turn
    6·1 answer
  • Java: Literal representing the true value ? In java, what is the literal that represents a true value ?
    6·1 answer
  • Why are coders using encoder software? What are their advantages and disadvantages? And when might a coder need to use the codin
    12·1 answer
  • The MAC address is a _____ bit number.
    10·2 answers
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • 4. What is the connection between productivity and Microsoft Office/ Office 365?
    13·1 answer
  • A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
    13·1 answer
  • The action of entering data into your computer. This can be text typed in a word processing document, keywords entered in a sear
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!