The boot process uses instructions stored in ________

Fill in the blank(s) with correct word

ROM

Computer Science & Information Technology

You might also like to view...

Custom input masks can be customized by either changing a predefined mask or manually changing the Input Mask property

Indicate whether the statement is true or false

Computer Science & Information Technology

Securing the contents of an e-mail or file by scrambling its contents is called:

A) decryption B) permissions C) encryption D) hiding

Computer Science & Information Technology