When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a file for future use, even after the computer has been turned off. secondary storage the central processing unit (CPU) software primary memory

Answers

Answer 1

Answer:

it could either be the R.A.M or the hard drive

Explanation:

Answer 2

Answer:

Secondary Storage

Explanation:

Secondary storage is permanent, therefore, it fits the context of what the question is asking for.


Related Questions

what is a . com in a web address mean

Answers

Answer:

dot commercial

Explanation:

.edu education

.gov goverment

Answer:

Commercial

Explanation:

Bro how the hell do u do full screen on windows
(LAPTOP. NOT PC.)
f11 does not work, does anyone have a solution?

Answers

Answer:

You'll need to hold down/click f11 and fn at the same time.

If not that, try ctrl + shift + f5.

I can guarantee the first works; not too sure about the second.

Explanation:

Well, it's hotkeys, so...

EDIT: The f5 command does nothing related to full screen, my bad.

Answer:

f11 should work just hold it down or restart your computer and try it again

Explanation:

discuss file Management
With relevant examples.
in a Computer?​

Answers

Answer:

File management is the process of administering a system that correctly handles digital data. Therefore, an effective file management system improves the overall function of a business workflow. It also organizes important data and provides a searchable database for quick retrieval

what is the economic and ideological causes of the American, the French,and the Chinese revolutions, and to see the larger historical contexts in which these events took place?​

Answers

Answer:

Explanation:The French who had direct contact with the Americans were able to successfully implement Enlightenment ideas into a new political system. The National Assembly in France even used the American Declaration of Independence as a model when drafting the Declaration of the Rights of Man and the Citizen in 1789.

is a general-purpose computing device?

Answers

Answer: I think so

Explanation: All mainframes, servers, laptop and desktop computers, as well as smartphones and tablets are general-purpose devices. In contrast, chips can be designed from scratch to perform only a fixed number of tasks, but which is only cost effective in large quantities (see ASIC).

Please give brainliest not this file virus exploiter

3. Never
to any instant messages, phone call, video call, or screen
staring requests from someone you do not know.
A. reply
B. refuse
C. forward text
D. accept pictures

Answers

Answer:

[tex]\color{Blue}\huge\boxed{Answer} [/tex]

B.Refuse

Answer:

Never reply to any instant messages, phone call, video call, or screen staring requests from someone you do not know.

Hope it helps u ARMY!!

What type of information is best suited for infographies?​

Answers

Answer:

All varieties of information, from bullet pointed text to numerical tables

Explanation:

Answer:

All varieties of information, from bullet pointed text to numerical tables

Explanation:

What should a valid website have?

Select one:
a. Cited sources, copyright, and a clear purpose
b. Cited sources, copyright, and a poor design
c. Cited sources, copyright, and colorful images
d. Cited sources, no copyright, and a broad purpose

Answers

Answer:

A. cites sources,copyright,and a clear purpose

Consider the following two data structures for storing several million words.
I. An array of words, not in any particular order
II. An array of words, sorted in alphabetical order
Which of the following statements most accurately describes the time needed for operations on these data structures?
A. Finding the first word in alphabetical order is faster in I than in II.
B. Inserting a word is faster in II than in I.
C. Finding a given word is faster in II than in I.
D. Finding the longest word is faster in II than in I.

Answers

Answer:

The correct answer is C.

Explanation:

Finding a given word requires the search operation. The search operation is faster in a sorted array compared to an unsorted array. In a sorted array the binary search method is used which runs on logarithmic time while in an unsorted array, there's no other way than linear search which takes O(n) time on the worst case where the required word is not in the array.

The statement which most accurately describes the time needed for operations on these data structures is: C. Finding a given word is faster in II than in I.

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data, especially by using the run-time complexity of Ο(log n)

Note: n is the total number of elements.

In Computer science, Binary search typically applies the principles of divide and conquer. Thus, to perform a binary search on an array, the array must first be sorted in an alphabetical or ascending order.

In conclusion, the statement which most accurately describes the time needed for operations on these data structures is that, finding a given word is faster in data structure II than in I.

Read more on data structure here: https://brainly.com/question/24268720

how do i remove my search history?

Answers

Step 1: Go to PC settings from the Start Menu or Desktop. Step 2: In PC settings, choose Search in the menu, and click Delete history.

Describe how data is shared by functions in a procedure- oriented program​

Answers

In procedure oriented program many important data items are placed as global so that they can access by all the functions. Each function may have its own local data. Global data are more vulnerable to an inadvertent change by a function.

What are
the rules for giving
variable name ?​

Answers

Answer:

Rules for naming variables:

- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.

- All variable names must begin with a letter of the alphabet or an underscore ( _ ).  For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.

- After the first initial letter, variable names can also contain letters and numbers.  No spaces or special characters, however, are allowed.

- Uppercase characters are distinct from lowercase characters.  Using all uppercase letters is used primarily to identify constant variables.  

- You cannot use a C++ keyword (reserved word) as a variable name.

Project Description:
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department.
Instructions:
For the purpose of grading the project you are required to perform the following tasks:
Step Instructions Points Possible
1. Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000
2. In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000
3. In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000
4. Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000
5. For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000
6. Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000
7. Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal.
Note, the bevel name may be Round, depending on the version of Office used. 4.000
8. Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000
9. Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000
10. Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000

Answers

Answer:

pelo o que diz na database é que você n é ser humano normal por perguntar isso!!

Suppose you are working as an administrative assistant at a small law firm. Your boss has asked you to send an invitation out to all employees about the upcoming holiday party. You would like to spruce up the invitation with a few festive images and a fancy border. Which file format would allow you to create a visually appealing invitation that can easily be e-mailed?

JPEG

PDF

SVG

TIFF

Answers

Answer:

PDF

Explanation:

Just did the assignment egde 2021

Answer:

It is B: PDF, as shown in the picture below

Which are the 2 main elements that’s make up computer architecture?

Answers

Answer:

Explanation:

Computer architecture is made up of two main components the Instruction Set Architecture (ISA) and the RTL model for the CPU.

how to be safe through internet? and what is e safety definition and what are the the rules of e safety pls pls I will give u 74 points lessgooo ​

Answers

Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and offline).

1. Keep Personal Information Professional and Limited

Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.

2. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both catsometimes(detsometimes hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

3. Practice Safe Browsing

You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

When you go online in a public place, .Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust

6. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget etc... .....

follow me entrust

Answer:

안녕

from my opinion don't tell anyone anything about you like be anonymous

and if anyone ask you where u live say earth he /she will think u became angry or for example you said to person 1 ( you stay in England )

but to person 2 ( say to stay in Japan )

but it's good to say nothing about you not even your name or age

I HOPE YOU UNDERSTAND ENGLISH IF NOT I CAN REWRITE IT IN KOREAN

Create a function that returns a dictionary containing the number of upper and lower case characters in a string (e.g. {'lower': 8, 'upper': 2}). Ignore whitespace characters. Your function should be able to handle an empty string, though.

Answers

Answer:

Explanation:

The following is written in Python and takes in the input string, then loops through it counting all of the upper and lower case letters and adds it to the dictionary.

string = input("input string: ")

upper_case = 0

lower_case = 0

for char in string:

   if char.isupper() == True:

       upper_case += 1

   elif char == ' ':

       pass

   else:

       lower_case += 1

letter_dict = {'upper_case': upper_case, 'lower_case': lower_case}

palindrome is a string that reads the same forwards as backwards. Using only a xed number of stacks, and a xed number of int and char variables, write an algorithm to determine if a string is a palindrome. Assume that the string is read from standard input one character at a time. The algorithm should output true or false as appropriate

Answers

Solution :

check_palindrome[tex]$(string)$[/tex]

   lower_[tex]$case$[/tex]_string[tex]$=$[/tex] string[tex]$. to$[/tex]_lower()

   Let stack = new Stack()

   Let queue = new Queue();

   for each character c in lower_case_string:

       stack.push(c);

       queue.enqueue(c);

   let isPalindrome = true;

   while queue is not empty {

       if (queue.remove().equals(stack.pop())) {

           continue;

       } else {

           isPalindrome=false;

           break while loop;

       }

   }

   return isPalindrome

Input = aabb

output = true

input =abcd

output = false

Write a function, AvgList, that takes a single argument, a list, and returns the average (mean) of the numbers in the list. You may assume that all elements of the list are numeric (int or float), and that the list has at least one element. Hints: Use the function SumList that you wrote above. Use the built-in function len to get the number of elements in the list.

Answers

Answer:

Answered below

Explanation:

//Programmed in Java

public double avgList(int [] nums){

int I;

double sumOfNumbers = 0;

double averageOfNumbers = 0;

//Loop over to sum all elements in the list.

for(I = 0; I < nums.length; I++){

sumOfNumbers += nums[I];

}

//Calculate the average

averageOfNumbers = sumOfNumbers/ nums.length;

return averageOfNumbers;

}

You are going to visit a national park, and have never been there before. You are using a map to try and make the distance travelled as short as possible. There are 5 intermediate towns, A, B, C, D, and E, you may gln your way to the park, and the distances between the various locations are given below.

Answers

Answer:

eggs fishing didn't ysjffj

What are the vertical areas of the spreadsheet?

a
Verticies
b
Ventricals
c
Columns
d
Rows

Answers

Answer:

Columns

Explanation:

A spreadsheet may a explained as a tabular arrangement or arrays of cells which allows users to enter both numeric and string data for storage, manipulation and analysis. The spreadsheet program has both the vertical and horizontal cell arrangement with the vertical areas being reffered to as THE COLUMN which are labeled using alphabets arranged from A - AZ, AA - AZ, and so on to make up a total of 16384 columns on the Microsoft Excel spreadsheet program. Cells are located using a combination of column and row address. With row representing the horizontal area of the spreadsheet and labeled with digits. Therefore cells are usually refereed to as A1, (column A row 1) and so on.

briefly explain 5 software which is either free or fee​

Answers

Answer:

65

Explanation:

Answer:

65

Explanation:

what is digital literacy? describe three examples of digital literacy skills

Answers

Digital literacy means having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile device

Examples of Digital Literacy skills:

What is digital literacy?

ICT proficiency.

Information literacy.

Digital scholarship.

Communications and collaborations.

Digital learning.

Digital identity.

Take a number N as input and output the sum of all numbers from 1 to N (including N).​

Answers

Answer:

Incluint respuet

Explanation:

espero que te sirva

Can two computers be assigned to one IP address

Answers

Answer:

two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses

Explanation:

Answer: maybe

Explanations: two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses.

Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.

Answers

Answer:

Explanation:

The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.

 public static T minmax(ArrayList<T> mylist) {

       T min = new T();

       T max = new T();

       for (int x = 0; x < mylist.size(); x++) {

           if (mylist.get(x) > max) {

               max = mylist.get(x);

           } else if (mylist.get(x) < min) {

               min = mylist.get(x);

           }

       }

       

       return (min, max);

   }

State the causes of the increase in carbondioxide
concerntration​

Answers

Answer:

The right response is "fossil fuels".

Explanation:

Fossil fuels such as coal as well as oil conduct electricity that has already been photosynthesized by vegetation or plant species from the ecosystem for thousands of generations.Within only several hundred years we've returned fuel to that same ecosystem or environment, the sources of CO₂ rise are fossil fuels.

However, the above solution is the right one.

Software as a Service (SaaS) allows users to
remotely access which of the following? Check all
of the boxes that apply.

software

data

applications

Answers

Answer:

Data software provides the best and most powerful software that allows you in the class

Answer:

software

data

applications

(all)

Explanation:

what does ICT stand for?​

Answers

Information Communication Technology

ICT stands for 'Information Communication Technology'. Everyday usage of digital technology includes when you use a computer, tablet or mobile phone, send email, browse the internet, make a video call - these are all examples of using basic ICT skills and technology to communicate.

Information Communication Technology

Me Completan Pliiiis

Answers

Answer:

its in Spanish most people cant read Spanish

Explanation:

Other Questions
Find the area of the shaded Which of the following factors is NOT a good way to distinguish governments? 1.How many people are in charge2.Where the government is geographically3.Who chose the people in charge4.How the people in charge decide to rule 2 Find the value of X * 5 2/5 4 9 3/5 You spin the spinner shown below once. The spinner has 444 equal sectors colored pink, purple, blue, and green.What is \text{P(green})P(green)start text, P, left parenthesis, g, r, e, e, n, end text, right parenthesis?If necessary, round your answer to 222 decimal plac Answer and explanation? Please help me, GodBless. In the second paragraph, the authors depiction of the scheme of merriment most clearly conveys hisA. naive simplicityB. cautious optimismC. neutral positionD. ironic perspectiveE. sense of resentment (3f3)^2 pls help aaaaaaaaaaaaaaaaaaaa question 1 - when energy transfers from the current to the air, what happens to the air temperature? question 2- when energy transfers from the air to the current, what happens to the air temperature? PLZZZZ ANSWER FAST!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Which quotations support the central idea that Brutus thinks it will do no harm and may actually benefit the conspirators if they let Antony give the eulogy at Caesar's funeral? Select two options. By your pardon;" "What Antony shall speak I will protest / He speaks by leave and by permission;" "And that we are contented Caesar shall / Have all true rites and lawful ceremonies" "It shall advantage more than do us wrong." "And show the reason of our Caesar's death" 2 The table below shows the cost, s, to purchase p pounds of steak at alocal grocery store.Cost of SteakNumber ofPounds (p)2.53.0$23.98$28.77$33.57$38.363.54.0Which statement is true about the relationship shown in the table?A The relationship is proportional, and the equation that represents thisrelationship is s = 9.59 + p.B. The relationship is proportional, and the equation that represents thisrelationship is s = 9.59 + P.The relationship is proportional, and the equation that represents thisrelationship is s = 9.59p.The relationship is not proportional. A spinner is divided into 8 equal sections and each section contains a number from 1 to 8. What probability of the spinner landing on 5? List at least three of the reasons Mao and the Communists won in China. Basting involves which of the following?A. Covering the outside with liquid while cookingB. Using as much of the chicken as possible once it is cookedC. Cooking it at a very high temperature for the first 15 minutesD. Tying the legs of the chicken together before putting it in the oven What is the correct answer marking brainliest if it's correct and explain if not no brainliest Read the paragraph from the introduction [paragraphs 1-3]. If the keystone species disappears from the ecosystem, no other species can do its job. The ecosystem would have to radically change, allowing new and possibly invasive species to take over the habitat. Which of the following words, if it replaced "radically" in the second sentence above, would CHANGE the meaning of the sentence? A. thoroughly B. completely C. drastically D. beneficially The pressure of a gas is 440. mm Hg. Express this in units of (a) atmospheres, (b) bars, and (c) pascals. A moving 10 kilogram object has 20 Joules of kinetic energy. What is its velocity?4 m/s2 m/s10 m/s200 m/s Which statements are true about the crisis in Cuba in 1962?Choose all answers that are correct.JFK agreed with his advisers who wanted to bomb Cuba.Cuba wanted the U.S. blockade to prevent Russia from sending more missiles to their island.JFK agreed to place U.S. missiles in Turkey.After 13 tense days, Khrushchev agreed to remove Soviet missiles from Cuba.The United States, Russia, and Britain signed a treaty to test nuclear arms together.A U.S. spy plane photographed Soviet missiles in Cuba. An auto maker estimates that the mean gas mileage of its sports utility vehicle is at least 20 miles per gallon. A random sample of 36 such vehicles had a mean of 18 miles per gallon and a standard deviation of 5 miles per gallon. At = .01 can you reject the auto maker's claim?