1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
2 years ago
9

Primary storage is electronic storage connected directly to the CPU. true or false​

Computers and Technology
1 answer:
Helen [10]2 years ago
7 0

Answer:

I think it's true

Explanation:

I don't know but If I'm wrong tell me?

You might be interested in
A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are
tensa zangetsu [6.8K]

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

8 0
3 years ago
Please help me for this question - Computer Science
gavmur [86]

Answer:

# F F F F 0 0

# F F 0 0 F F

# 0 0 F F F F

Explanation:

Hex values are your friend.

The first two digits represent red.

# F F 0 0 0 0 - Red

The second two digits represent green.

# 0 0 F F 0 0 - Green

The third two digits represent blue.

# 0 0 0 0 F F - Blue

If you know yellow is a combination of red and green, you express the corresponding digits.

# F F 0 0 0 0 - Red

# 0 0 F F 0 0 - Green

+

-------------------------------

# F F F F 0 0 - Yellow

Similarly,

If you know magenta is a combination of red and blue, you express the corresponding hex digits.

# F F 0 0 0 0 - Red

# 0 0 0 0 F F - Blue

+

-----------------------------

# F F 0 0 F F - Magenta

And finally,

If you know cyan is a combination of green and blue, you express the corresponding hex digits.

# 0 0 F F 0 0 - Green

# 0 0 0 0 F F - Blue

+

----------------------------

# 0 0 F F F F - Cyan

What does it mean to "express the digits"?

If you know anything about how color works on a computer, you'll know that you can express a certain amount of red, green and blue to get almost any color. These are known as "RGB" values. In RGB, the red, green or blue can individually go from 0 - 255. Think of it like a slider for how much you want of each color.

In RGB:

RGB (255, 255, 255) - White

Hex is just a really convenient and shorthand way to write the RGB color values.

In Hex:

#FFFFFF - White

6 0
3 years ago
Which of the following members of the creative department uses “code” to create the physics that makes up the virtual world?
cestrela7 [59]

Your Answer Here Is...

Animators :) they make animations

4 0
3 years ago
Read 2 more answers
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
nikklg [1K]

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

4 0
3 years ago
What is the key function of a Scrum Master?
Reptile [31]

Answer:

The scrum master is the team role responsible for ensuring the team lives agile values and principles and follows the processes and practices that the team agreed they would use. The responsibilities of this role include: Clearing obstacles. Establishing an environment where the team can be effective.

Explanation:

8 0
4 years ago
Other questions:
  • What is the special feature of the view side by side command?
    11·2 answers
  • I damaged a k12 laptop. do I have to pay for the damage? and if so how much?
    5·1 answer
  • Write down the complete procedure for creating ExcelSheet.
    8·1 answer
  • Try of false using a combination of alt and a key underlined in the command you want is a short cut?
    6·1 answer
  • A relational database is different from a simple database because it has more than one _____.
    13·1 answer
  • Name the steps to insert a cover page.
    14·1 answer
  • Please tell fast plzzzzzz​
    6·1 answer
  • When your grounded and the only thing you can get on is a computer........................oh welllllllllllllllllllllllllllllllll
    7·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • Write an inheritance hierarchy for classes Quadrilateral, Trapezoid, Parallelogram, Rectangle and Square. Use Quadrilateral as t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!