The boot process uses instructions stored in ________
Fill in the blank(s) with correct word
ROM
Computer Science & Information Technology
You might also like to view...
Custom input masks can be customized by either changing a predefined mask or manually changing the Input Mask property
Indicate whether the statement is true or false
Computer Science & Information Technology
Securing the contents of an e-mail or file by scrambling its contents is called:
A) decryption B) permissions C) encryption D) hiding
Computer Science & Information Technology