1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
13

Name:

Computers and Technology
1 answer:
Elanso [62]3 years ago
4 0
1 6gb of ram
inteel
500gb
500gb
You might be interested in
Why might your coworker suggest encrypting an archive file before e-mailing it??
Genrish500 [490]
Because to prevent MITD (Man in the middle is a man that in the middle of the network. For example: You are sending a text, the man in the middle or in the modem will receive the text and can edit it and send it to the receiver, or the man will put the virus in...) and to prevent server snooping
8 0
3 years ago
Give me your 3ds friend code :)
Karolina [17]

You can friend me mine is- 3024-6635-0458

4 0
4 years ago
In access, the columns in a table are called?
liubo4ka [24]
All tables are composed of horizontal rows and vertical columns, with small rectangles called cells in the places where rows and columns intersect. In Access, rows and columns are referred to as records and fields. A field is a way of organizing information by type.
6 0
3 years ago
2. Which of the following functions adds a range of cells and then divides by the number of cell entries? *
postnew [5]
Hello Mate. Good Works!

Answer: B) Average
*The numbers entered will be divided.

Kind Regards
5 0
4 years ago
Read 2 more answers
When you break an iPad, can you recover an iMovie?
kompoz [17]
Yes, on your cloud. you should have an email 

7 0
3 years ago
Read 2 more answers
Other questions:
  • How to calculate 100MB at 56 Kbps to transfer time?
    13·1 answer
  • Data about the size and composition of a population are gathered in a survey called _____.
    6·2 answers
  • The type of meter used to test downstream digital signal quality
    12·1 answer
  • Word 2013 opens, by default, on a blank document?
    13·2 answers
  • Which area would a Gaming Designer fall under? Research and explain why you think so. Make sure to site your source and where yo
    7·1 answer
  • It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
    5·1 answer
  • Improvements in technology make the world seem larger to people.<br> a. True<br> b. False
    6·2 answers
  • The entress Effie cooks as a chef never vary by taste, quantity or quality
    6·1 answer
  • 3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
    12·1 answer
  • When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for di
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!