1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
9

What is ROM?

Computers and Technology
1 answer:
tresset_1 [31]3 years ago
6 0

Answer:

is a type of electronic storage that comes built in to a device during manufacturing. ... ROM chips come built into an external unit – like flash drives and other auxiliary memory devices – or installed into the device's hardware on a removable chip.

Explanation

You might be interested in
Write a recursive method in pseudo code that returns the number of 1's in the binary representation of n. use the fact that this
Deffense [45]
Int count(int num)

if   num==0   return  0;
return   (n&1)+count (n/2)


4 0
3 years ago
One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
mote1985 [20]

Answer: True

Explanation: Security management firm is the organization that provides protection to the system, functions,data, people etc of any particular business organization.They are highly capable of the problem avoidance, management of risk and other such issues.

The monitoring of the security done by the people and devices of the security management firm are more reliable and assured due to the expert skill they persist in the security field. Thus, the given statement is true.

8 0
3 years ago
Read 2 more answers
How do you tack pictures for this app
olga2289 [7]
There is a paper clip on the bottom left on your screen. When answering a question click it to apply a picture. Have a wonderful day.

(Take*)
3 0
3 years ago
: Each individual data items of record is called a
musickatia [10]
Each individual data items of record is called field (letter A).
The client may communicate with Proxy server to use a protocol to proxy the communication between the client and the DBMS. Proxy servers lets you hide your real Ip address and replaces it with a new IP obtained from proxy server sites.

6 0
4 years ago
Renter’s insurance is not necessary if you don’t have a lot of expensive things.
attashe74 [19]

Wrong, You should get renters insurance to insure your items that you do have or will recieve in the future are safe

7 0
4 years ago
Other questions:
  • Finding your style in photography is about ___
    10·2 answers
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • Which of the following statements about Linux is not​ true? A. Linux works on all the major hardware platforms. B. It plays a ma
    5·1 answer
  • Which file extension indicates that a file is an Adobe Acrobat document?
    13·1 answer
  • All of the following are reserved keywords in C++ EXCEPT
    5·1 answer
  • What other options are there besides jail for 16 year old that commit a crime?
    8·2 answers
  • Pls help will give brainlest​
    15·2 answers
  • Inserting and deleting text is a basic editing task in word processing.<br><br> True or false
    6·2 answers
  • What is the role of computer in education sector?​
    13·1 answer
  • in a small town, there are two providers of broadband internet access: a cable company and the phone company. the internet acces
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!