The operating system of a cell phone is stored in ________

A) ROM B) an SD card C) RAM D) the CPU

A

Computer Science & Information Technology

You might also like to view...

Data ________ are available for certain table events, such as updating data

A) groups B) blocks C) actions D) events

Computer Science & Information Technology

?The threats-vulnerabilities-assets (TVA) worksheet is a document that shows a comparative ranking of prioritized assets against prioritized threats, with an indication of any vulnerabilities in the asset/threat pairings.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology