What are the memory locations inside the CPU called?

What will be an ideal response?

Registers

Computer Science & Information Technology

You might also like to view...

Select all of the following statements regarding security policy that are true.

a. Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers. b. Your small, home-based business probably is not at risk from hackers. c. Access to sensitive data should be limited to only to employees who have worked for the company for more than six months. d. Training on computer security should be provided for all staff members.

Computer Science & Information Technology

A search can be performed on an array of

A) integers. B) strings. C) objects. D) all of the above, but only if the data is in order. E) all of the above whether the data is in order or not.

Computer Science & Information Technology