1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
14

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Computers and Technology
1 answer:
rosijanka [135]3 years ago
8 0

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

  • Computer data storage can be regarded complex system, immediately a data is saved then;

  • The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

  • The hardware will record this saved numbers inside the computer.

  • These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:brainly.com/question/21571591?referrer=searchResults

You might be interested in
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
4 years ago
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
Windows domain policy to disable windows 10 update
Greeley [361]

Group Policy, change the setting "Turn off the upgrade to the latest version of Windows through Windows Update," which can be found in Computer Configuration / Administrative Templates / Windows Components / Windows Update.

Doing so sets the registry value described in the rest of this step. Note that for Home versions of Windows 7 and 8.1, where the Group Policy editor is not available, editing the registry is the only option.

To make this change with Regedit, navigate to the following key.

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate

Important: If that key doesn't exist, you'll need to create it.

Create a DWORD value called DisableOSUpgrade and set it to 1. (If that sentence makes no sense, you probably shouldn't be using Regedit.)

7 0
3 years ago
What are the ethical implications of online social media after someone has died?
ZanzabumX [31]
<span>Think about the things people might have wanted private, but after death they have no control.</span>
8 0
3 years ago
Anyone here have Tik Tok?I'm just curious. :) my acc is alexlpark1fanaccount btw thanks!
kiruha [24]
Haircut is my name on tictok
8 0
3 years ago
Other questions:
  • To remove an embedded chart, you should _____ it and press the DELETE key.
    14·2 answers
  • Tab stops are very useful when you want to A. align text into rows. B. add space between paragraphs. C. align text into columns.
    14·2 answers
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • Part 1 Create a program that asks the user for a temperature in Fahrenheit, and then prints the temperature in Celsius. Search t
    12·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • Write an expression that computes the integer average of the int variables exam1 and exam2 (both declared and assigned values).
    15·1 answer
  • Which of the following is not a benefit of shaping data with the Power Query Editor?
    13·1 answer
  • You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the inf
    11·1 answer
  • Use the {blank} to view your presentation the way an audience will see it.
    13·2 answers
  • Connect research concepts to their definitions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!