1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
10

What happens to the data in rom when the power is turned off?

Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
5 0
Nothing. It's still in it's memory.
If it was an EPROM however, it would be erased.
You might be interested in
16^2-8xy+y^2-25(x-y)^2
Julli [10]
\left[x _{2}\right] = \left[ \frac{21\,y}{25}+\frac{\sqrt{\left( 25600 - 636\,y^{2}\right) }}{50}\right][x​2​​]=[​25​​21y​​+​50​​√​(25600−636y​2​​)​​​​​]
4 0
3 years ago
John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the following
den301095 [7]
John should use FTP Services.

For John to quickly transfer a large volume of data, he should have use FTP (File Transfer Protocol). FTP is the network protocol commonly used for exchanging files over the internet. There are a lot of software applications for file share transfer such as FileZilla and SmartFTP.
6 0
4 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
List and describe the tools for all the main stages of app/application development.
Liono4ka [1.6K]
<span>stuff like -Information Gathering -Planning -Design -Development -Testing and Delivery <span>Maintenance hope that helped.</span></span>
8 0
3 years ago
Give two differences between EIRGP and RIP.
qaws [65]

Answer and Explanation:

Difference between EIRGP and RIP :

  • RIP stands for routing information protocol whereas EIRGP stands for enhanced IGRP, IGRP is interior gateway routing protocol
  • EGRIP is more based on the link where as RIP is more based on routing
  • There is also references in their working operation.
  • Differences in updates and refreshing.  

7 0
4 years ago
Other questions:
  • An attempt to exploit a vulnerability of a computer or network component is the definition of ________.
    15·2 answers
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • NEED ASAP!!
    14·1 answer
  • Write a program that reads in any number of MyStrings of characters from the user and determines if each MyString is a palindrom
    14·1 answer
  • Which best explains a password attached to a document?
    7·1 answer
  • What is the google search operator that limits results to a specific domain?
    8·1 answer
  • When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
    5·1 answer
  • How to look at things you previously applied to on handshake
    13·1 answer
  • Which X software package is designed to be a more streamlined and easier to use replacement for the X Window System
    12·1 answer
  • Which of the following Office Online apps is most effective for creating multi-media presentations?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!