1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
7

Notes on secondary memory​

Computers and Technology
1 answer:
gladu [14]3 years ago
7 0

Answer:

non-volatile and persistent in nature

You might be interested in
I need the answer ASAP!!!! I’ll mark brainliest if correct
Anvisha [2.4K]

Answer:

Option D

Explanation:

option d component level design model is the correct answer

4 0
3 years ago
If you change a column header in your data source, what would you press to ensure that the data is synced as expected?
kobusy [5.1K]

You should press the Match Fields to ensure that the data is synced as expected.

8 0
3 years ago
Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are calle
In-s [12.5K]
Hi!

These programs which allow a peripheral device to interact with the rest of the computer system are going to be <em>device drivers.</em>

Hopefully, this helps! =)
3 0
3 years ago
Case Project 13-3 A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s att
kkurt [141]

Answer:

idk

Explanation:

6 0
3 years ago
The first step in responding to any sports injury is to __________.
Montano1993 [528]
A. Remove the danger that lead to the injury.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A program to add two numbers in C++
    15·1 answer
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • Framing can create which of the following in a photograph? Mystery Saturation Aperture All of the above
    10·2 answers
  • Which of the following scenarios might indicate that you have been a victim of identity theft?A)Your credit report displays acco
    12·1 answer
  • Which of the following reflects Moore's law? Multiple Choice The doubling of computer chip performance per dollar every two year
    11·1 answer
  • Assume that the following method header is for a method in class A.
    15·1 answer
  • What do the buttons on the paste options menu do
    11·1 answer
  • I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that
    10·1 answer
  • How does the autosum command calculate data? Need help ASAP​
    5·1 answer
  • ___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-t
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!