1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
8

It is most commonly used for self-running presentations.

Computers and Technology
1 answer:
DedPeter [7]3 years ago
6 0

Answer:slides

Explanation: because in the slide you can make a presentation

You might be interested in
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued
adoni [48]

Answer: NVRAM(Non-volatile random-access memory)

Explanation:Non-volatile random-access memory(NVRAM) is the memory that has a non-volatile nature.It is used for retaining of the data even when the system gets switched off .

This memory uses the power source from the CMOS battery for executing the functions. It is designed by using the pin configurations containing 24 pin in DIP(Dual inline package). So the situation mentioned in the question of storing the changes will appear in the NVRAM.

4 0
4 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
The soft-tissue lining of oysters and clams creates pearls. Is a pearl a mineral?
Kisachek [45]
<span>A pearl is not a mineral because it is created artificially. It is a gemstone, not a mineral because it is a composite of mineral Aragonite and a protein compound which is called conchiolin. Pearls are formed by organic and living organisms which is preserved to become a gemstone.</span>
3 0
3 years ago
Read 2 more answers
Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
Mekhanik [1.2K]
Int tmp;
tmp = firstplacewinner;
firstplacewinner = secondplacewinner;
secondplacewinner = tmp;
5 0
3 years ago
What is the output voltage of a typical size "D" NiCad cell?
OLEGan [10]
<span>The output voltage of a typical size "D" NiCad cell would be 1.2 volts.</span>
8 0
4 years ago
Other questions:
  • From the ages of 18 to 24, individuals born from 1980 to 1984 held an average of 6.2 jobs—which is slightly higher than the numb
    10·1 answer
  • Which type of computer do dedicated gamers and video editors prefer?​
    11·1 answer
  • On a pie chart, the different sections or "wedges" show:
    9·1 answer
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
    12·1 answer
  • You can use a 32-bit processor to install the hyper-v role as long as it supports virtualization extensions. true or false
    5·1 answer
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • 0 -10°
    12·1 answer
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
  • Technology?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!