1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
5

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RR

AM) is called a(n) ___ .
Computers and Technology
1 answer:
maksim [4K]3 years ago
4 0
Computer data storage
You might be interested in
Which of the following demonstrates the proper way to specify a variable-length argument list?
larisa86 [58]

Answer:

The answer to this question is option "d".

Explanation:

In the given question option d is correct because variable-length argument is a new feature in J2SE 5.0 which stands for java 2 standard edition and 5.0 is the version name. It is the variable-length argument lists. A coder can create functions that uses a function to receive several parameter that is not specified. An argument type followed by an ellipsis(...) in the parameter list of a method means that a fixed number of arguments of that particular type is obtained by the method. and other options are not correct that can be given as:

  • In option a, we do not need to use the string the variable-length argument list. That's why it is wrong.
  • The option b and c are all wrong because in the last parameter the variable-length argument list is used.

That's why the answer to this question is the option "d".

7 0
3 years ago
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
Advocard [28]

Answer:

A. True.

Explanation:

E-mail is an acronym for electronic mail and it can be defined as an exchange or transmission of computer-based data (messages) from one user to another over a communications network system.

Also, a distributed application refers to a software program that is capable of running on several computer systems and can communicate effectively through a network.

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms because it primarily operates on a client-server model, by providing users with the requested services through the Simple Mail Transfer Protocol (SMTP) using the standard port number of 25.

7 0
3 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
Which requires large computer memory?
Sav [38]

Answer:

Imaging , Graphics and voice..... requires large computer memory.

Explanation:

5 0
3 years ago
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
choli [55]

Answer:

Default gateway

Explanation:

The default gateway would be needed to change for the configuration value because when plugged to the computer system into other's network. The Internet Protocol addressing for network users that is static. Then, the other user finds the system can connect on a similar subnet with hosts and not with hosts on another subnet and no further computer systems have facing the problem.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which of these does an open office or Microsoft Office wizard do?
    7·1 answer
  • 10. How does a command work in conjunction with a switch?
    14·1 answer
  • What is the difference between Counter Controlled iterations and Sentinel Controlled iterations? What is the purpose of the incr
    8·1 answer
  • How do you delete an credit card off an iPhone 7
    5·1 answer
  • What is your favorite coler and what do you like to do and
    13·1 answer
  • The long-run average cost curve is typically _______________________. a) downward-sloping at first but then b) upward-sloping up
    14·1 answer
  • Cú pháp câu lệnh xóa thủ tục
    12·1 answer
  • How to use function in python
    10·1 answer
  • What method does a gsm network use to separate data on a channel?
    12·1 answer
  • How to write a C++ program that lets the user guess if a randomly generated integer is even or odd then the computer lets them k
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!