1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
7

Fill in the blank with the correct response.

Computers and Technology
1 answer:
Andre45 [30]3 years ago
3 0
Shareware hope that helps
You might be interested in
Which storage is faster than secondary storage​
kozerog [31]

Answer:

RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.22-Aug-2019

5 0
3 years ago
Read 2 more answers
What type of things can be marketed
Andreas93 [3]

Answer:

Physical goods that can be manufactured, or produced are the major items among those can be marketed. Examples include refrigerators, computers, music systems, food products, etc. Such physical goods constitute the bulk of production and marketing efforts. And here are the types of marketing Traditional Marketing. Traditional marketing refers to brand promotion on any kind of channel that has been around since before the advent of the internet.

4 0
3 years ago
Question 1
likoan [24]

Answer:

No Answer by by a third jsjshs

7 0
2 years ago
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
butalik [34]

Answer:

backup; recovery

Explanation:

Backup and recovery refers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data, so that it is accessible in case of data deletion or corruption. Data from an earlier time may only be recovered if it has been backed up.

Data backup is a form of disaster recovery and should be part of any disaster recovery plan.In some cases, backing up or restoring entire systems, or the enterprise, after an event or disaster can take days

5 0
4 years ago
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
Other questions:
  • A _______ is smaller than a notebook or laptop and has a touchscreen and sometimes a pointing device.
    13·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • A financially stable person is able to
    12·2 answers
  • Which of the following people choose a career path for the right reasons
    12·2 answers
  • Which option marks all modification made within a document? Review Comment Track Changes Balloons
    15·2 answers
  • The set of rules for how computers talk to one another
    6·1 answer
  • Study the images of two different fronts.
    7·2 answers
  • How can you rotate and resize your drawing?​
    9·2 answers
  • Which feature helps an edit-test-bug cycle work faster in the python programming language?
    15·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!