when looking for a type of memory that can be read and writen from the host (i.e., the cpu), the type to look for is:

Answers

Answer 1

Random Access Memory is the read-write memory also known as the primary memory is a type of memory that can be read and written from the host.

RAM is primary-volatile memory, it serves as the CPU's internal memory for storing data, programmes, and programme output. This read/write memory serves as a data escrow until the computer is operational. Data is wiped as soon as the machine is turned off.

Since each storage location inside the memory is equally accessible and requires the same amount of time to reach, access time in RAM is independent of the address. Although random access to RAM data is possible, it is exceedingly expensive.

For further information regarding memory, click the link below:

brainly.com/question/30076483

#SPJ4


Related Questions

what does disabling the default administrator account and setting up an alternative account accomplish?this type of question contains radio buttons and checkboxes for selection of options. use tab for navigation and enter or space to select the option.this type of question contains radio buttons and checkboxes for selection of options. use tab for navigation and enter or space to select the option.optiona makes it more difficult for someone to guess the log-on informationoptionb makes the password strongeroptionc allows closer management of administrator accessoptiond keeps administrators conscious of security

Answers

Disabling the default administrator account and setting up an alternative account accomplishes the following Option C: Allows closer management of administrator access.

1. **Makes it more difficult for someone to guess the log-on information (Option A):** Disabling the default administrator account may help in preventing unauthorized access since the default administrator username is commonly known. However, this option alone does not directly address the log-on information or guessing of passwords.

2. **Makes the password stronger (Option B):** Disabling the default administrator account does not inherently make the password stronger. The strength of the password is determined by the complexity, length, and adherence to security best practices when setting up the alternative account's password.

3. **Allows closer management of administrator access (Option C):** Disabling the default administrator account and setting up an alternative account enables organizations to have better control and oversight of administrative access. By using a separate alternative account, the organization can assign specific privileges and permissions to individual administrators, track their activities, and implement stricter access controls.

4. **Keeps administrators conscious of security (Option D):** While disabling the default administrator account can contribute to heightened security awareness among administrators, it does not directly enforce consciousness of security. Administering security practices and policies is an ongoing effort that involves training, regular reminders, and fostering a culture of security within an organization.

In summary, the option that accurately reflects the accomplishment of disabling the default administrator account and setting up an alternative account is **Option C: Allows closer management of administrator access**. It provides organizations with improved control, monitoring, and customization of administrative privileges and permissions.

Learn more about administrator here

https://brainly.com/question/14783741

#SPJ11

What did you do over the Summer?


Answers

Answer:

I studied for SAT the whole 2 months, studying 18 hours a day...

I honestly didn't do anything because of Corona

1. Which of the following is the closest definition of embedded systems?
-a software that performs a specific function
-devices that perform multiple tasks
-hardware designed to perform a distinctive function*
-the combination of hardware and software designed for a specific purpose

2.Select the function of keypunches that were used as one of the earliest input devices.(1 point)
-It was used for punching holes in the paper at relevant positions for the computer to understand the instructions.
-It was used to control the cursor on the screen.
-It was used to press the buttons feed information into the computer.*
-It was used to insert one character on the paper at a time.

3.Which of the following set defines the storage devices?(1 point)
-magnetic disks, optical disks, flash drive, SSD, and floppy disk*
-floppy disk, magnetic disks, SSD, and mouse
-typewriter, SSD, and mouse
-SSD, optical disks, and keypunches

4. What does computational thinking involve?(1 point)
-breaking down complex problems into smaller pieces for easy resolution
-thinking like a computer
-disregarding non-essential information*
-hiding unnecessary details from the user

5.What is a complex problem?(1 point)
-a problem that can only be resolved using a computer
-a problem with no obvious or immediate resolution
-a problem that requires multiple computers to resolve
-a problem that requires collaboration*

Answers

The option that is the closest definition of embedded systems is option d: the combination of hardware and software designed for a specific purpose.

The function of keypunches that were used as one of the earliest input devices is that It was used for punching holes in the paper at relevant for the computer to understand the instructions.

The set that defines the storage devices are magnetic disks, optical disks, flash drive, SSD, and floppy disk*

Computational thinking involve breaking down complex problems into smaller pieces for easy resolution.

A complex problem is a problem with no obvious or immediate resolution.

What is an embedded systems?

An embedded system is known to be a kind of a system that is said to be the combination of both the computer hardware and that of the software and it is one that is set up for a specific function.

Note that the Embedded systems may function inside a larger system and thus The option that is the closest definition of embedded systems is option d: the combination of hardware and software designed for a specific purpose.

Learn more about embedded systems from

https://brainly.com/question/13014225

#SPJ1

Which memory part is connected to the processor?Which memory part is connected to the processor?

Answers

Well they are all separate pieces but you might be talking about ram ram is the random access memory which the CPU goes into sometimes

write the method heading for a method called larger that accepts 2 integer arrays and returns the array with the larger number of elements.

Answers

Writing a function to compute the average of the even numbers in the array is required for this application.

The percentage function When given an array of integers as a parameter or argument, even prints the average of the even numbers. The code below implements the aforementioned functionality in Python, and the code's output is also included. In computer science, an array is a group of objects (values or variables). At least one array index or key is used to uniquely identify each element. Given its index tuple, a mathematical formula can determine each element's location in an array. The simplest basic type of data structure is a linear array, sometimes known as a one-dimensional array. Since a two-dimensional grid can theoretically be used to represent a matrix, two-dimensional arrays are occasionally referred to as "matrices."

Learn more about array here:

https://brainly.com/question/28945807

#SPJ4

zybooks Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. Ex: If testGrades

Answers

We can achieve this by using the following code snippet:```

sumExtra = 0;

for (i = 0; i < NUM_VALS; i++) {

   if (testGrades[i] > 100) {

       sumExtra += testGrades[i] - 100;

   }

}

```In this code, we initialize `sumExtra` to `0`, and then use a `for` loop to iterate through all the elements of the `testGrades` array. For each element that is greater than `100`, we add the difference between that element and `100` to `sumExtra`.

Given zybooks Array `testGrades` contains `NUM_VALS` test scores, we need to write a for loop that sets `sumExtra` to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. We can achieve this by using the following code snippet:```

sumExtra = 0;

for (i = 0; i < NUM_VALS; i++) {

   if (testGrades[i] > 100) {

       sumExtra += testGrades[i] - 100;

   }

}

```In this code, we initialize `sumExtra` to `0`, and then use a `for` loop to iterate through all the elements of the `testGrades` array. For each element that is greater than `100`, we add the difference between that element and `100` to `sumExtra`.

Finally, after the loop is done executing, `sumExtra` contains the total extra credit received in all `NUM_VALS` test scores.Note: The above code snippet assumes that `testGrades` is an integer array, and `NUM_VALS` is an integer variable that holds the number of elements in the array.

Learn more about integer here,

https://brainly.com/question/929808

#SPJ11

HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP

Answers

Answer:

what is it that u need help with

Explanation:

What’s wrong, you okay? You acting a bit sus

Explain in your own words what a computer is. Expose in your answer the parts, operation, what it serves us for, etc. Why do we say that the computer is an electronic device?

Answers

Answer:

Explanation:

What is a computer?

A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos. A computer has these basic parts: Monitor, keyboard, mouse and system unit

After updating business information, what's next to click?
A. Close Tab
B. Update Publication
C. Delete
D. New

Answers

Answer:

B. i think????!!

Explanation:

i answer that.

What are the qualities of strong leaders? Check all that apply. They inspire others. 1)They are easily influenced by others. 2)They are outstanding role models. 3)They have a strong sense of purpose. 4)They lack self-confidence.

Answers

Answer: 2 and 3
Explanation:

I would pick 2 and 3 based on process of elimination

two examples of how scientists, technologists, engineers, and mathematicians may work together to create a new product

Answers

Answer:

Which places were Included in Nepal by Pratap. Singh Shah in his short rule

The most pragmatic option for data disposal in the cloud is _______________ in Melting, Crypto-shredding, Cold fusion, or Overwriting.

Answers

The most pragmatic option for data disposal in the cloud is "Overwriting." Option D is answer.

When it comes to data disposal in the cloud, overwriting is considered the most pragmatic option. Overwriting involves replacing the existing data with random or meaningless data, making the original data unrecoverable. This process typically involves writing over the storage media multiple times, ensuring that any remnants of the original data are effectively erased.

Overwriting provides a secure and reliable method for data disposal in the cloud, as it ensures that the sensitive or confidential information cannot be retrieved or accessed by unauthorized individuals. Therefore, among the options provided, overwriting is the correct answer for the most pragmatic option for data disposal in the cloud.

Option D is answer.

You can learn more about cloud  at

https://brainly.com/question/30227796

#SPJ11

What are benefits of using AWS Organizations? (Choose two.) O Replaces existing AWS Identity and Access Management (IAM) policies with service control policies (SCPs), which are simpler to manageO Provides the ability to create groups of accounts and then attach policies to a group O Provides the ability to create an unlimited number of nested organizational units (OUs) to support your desired structure O Simplifies automating account creation and management by using APIsO Prevents any restrictions from being put on the root user that is associated with the main organization in an account

Answers

The  benefits of using AWS Organizations are that it provides the ability to create groups of accounts and then attach policies to a group, and Simplifies automating account creation and management by using APIs. Thus, option 2nd and 4th are correct.

What are AWS Organizations?

AWS Organizations is a service that allows you to merge numerous AWS accounts into a single organization that you establish and administer centrally. AWS Organizations features account administration and unified invoicing tools, allowing you to better meet the business's financial, security, and compliance requirements.

The advantages of utilizing AWS Organizations are that it allows you to build groups of accounts and then connect policies to them, and it simplifies account creation and maintenance by leveraging APIs. As a result, options 2nd and 4th are correct.

Learn more about AWS Organizations here:

https://brainly.com/question/30176139

#SPJ1

A device-free rule to show respect

Answers

An example of device-free rule to show respect to others are:

Avoid looking at your phone during meetings.Avoid having it on your lap.Concentrate on the individual who needs to get your whole attention, such as a client, customer, coworker, or boss.

What is proper smartphone behavior?

Don't allow your phone rule your life; take back control of it! Talk quietly. Respect people you are with by putting your phone away if it will disrupt a discussion or other activity.

Therefore, Be mindful of how you speak, especially when others may hear you. Never discuss private or secret matters in front of others.

Learn more about respect from

https://brainly.com/question/1309030
#SPJ1

patulong po need na po ngayon 20 pts po ibibigay ko thanks​

patulong po need na po ngayon 20 pts po ibibigay ko thanks

Answers

4 this is really all you need to hear it’s very not compliant EE I hope this helpped and the bro above is not a hot tutor at all!

How electrical current manifests itself?

Thermal

Mechanic

Magnetic

Radiation (electromagnetic)

All listed

Answers

Answer:

Mechianic

Explanation:

The line represents a visible line that represents features that can be seen
in the current view.
Continuous Thick Line
Pictorial Sketch Types
Aligned Section View
Chain Thin Line

Answers

We use the Continuous Thick Line representation which uses in the line.

The continuous thick line represents a sample that depicts features seen in the current view, which can be used to represent apparent contours and boundaries.

In this, the scribbled lines are used to generate contours and edges that are not visible from the outside.This line type is utilized in site plans for apparent outlines, general detailing, existing structures, and landscaping.

Therefore, the answer is "continuous thick line".

Learn more about the line here:

brainly.com/question/26196994

The line represents a visible line that represents features that can be seenin the current view.Continuous

As per the statement, the line represents the visible part of the features that can be seen in the current views as the line is a continuous thick line.  Thus the option A is correct.

Which line represents a visible feature of current view.?

The visible lines are those that make up most of the visible part of the features and are noted for the summary lines and refer to the specific views.

A continuous line can be easily seen and is visible for very far and hence this line is a sorrowing the side of the matter. It can be used to outline the object and is has a medium weight.  Hence the visibility of the line is lone factor of the continuality and thickness.

Find out more information about the line represented.

brainly.com/question/12242745.

I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.

PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(

I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how

Answers

Answer:

You need to first use the Sum function to add up all the costs of September.

Then divide each September cost by the grand total that you got. After that format the last column to be percentages.

Look at the attached file for the formulas used.

questions about the data policy and privacy policy of YT
the questions are in the picture attached below!

questions about the data policy and privacy policy of YTthe questions are in the picture attached below!

Answers

Answer:

I'm confused

Explanation:

Hola, disculpa me podrías ayudar enviándome una captura dándole like a este video? Por favor, es un proyecto escolar en el que el alumno que más Likes logre recolectar para este video, obtendrá puntos extras. Si deseas después de la captura puedes ya quitarle el like.

Answers

Answer:

Una captura de pantalla es una instantánea de la pantalla de un dispositivo informático, como un teléfono o una computadora. Mantenga presionado el botón de encendido y el botón de columna hacia abajo para tomar una captura de pantalla en teléfonos inteligentes.

Explanation:

Una captura de pantalla de la pantalla de un dispositivo de computadora es como tomar la foto de una pantalla. Para los teléfonos inteligentes, presionar la columna hacia abajo y el botón de encendido tomaría la instantánea del teléfono.

Para darle Me gusta a un video en una plataforma de redes sociales, simplemente haga clic en el ícono de pulgar hacia arriba.

in this proc contents output, what is the default length of the birth_date column?

Answers

The default length of the "birth_date" column in this proc contents output is determined by the type of data that is stored in the column. If the column is a numeric type, the default length will be 8. If the column is a character type, the default length will be determined by the length of the longest string in the column.

To find the default length of the "birth_date" column, you can look at the "Type" and "Length" columns in the proc contents output. The "Type" column will tell you whether the column is a numeric or character type, and the "Length" column will tell you the default length of the column.

For example, if the "Type" column for the "birth_date" column is "NUM" and the "Length" column is "8", then the default length of the "birth_date" column is 8. If the "Type" column is "CHAR" and the "Length" column is "10", then the default length of the "birth_date" column is 10.

In conclusion, the default length of the "birth_date" column in this proc contents output is determined by the type of data that is stored in the column and the length of the longest string in the column.

Learn more about programming: https://brainly.com/question/16397886

#SPJ11

Contiguous allocation of files leads to disk fragmentation, as mentioned in the text, because some space in the last disk block will be wasted in files whose length is not an integral number of blocks. Is this internal fragmentation or external fragmentation? Make an analogy with something discussed in the previous chapter.

Answers

The statement, "Contiguous allocation of files leads to disk fragmentation, as mentioned in the text, because some space in the last disk block will be wasted in files whose length is not an integral number of blocks." is referring to internal fragmentation

External fragmentation refers to the problem of unused space existing between allocated blocks of memory in a system that uses variable memory partitioning (i.e., the allocation of an object in the memory is limited to a contiguous area of free space).

External fragmentation can be compared to a parking lot where vehicles must park in specific spaces that are large enough to accommodate them.

A situation occurs when a driver tries to park a car, and the only open spots are too small to accommodate the vehicle, resulting in the formation of small unused areas across the lot.Internal fragmentation, on the other hand, happens when there are portions of an allocated space that are left unused in the system

Learn more about Contiguous allocation at

https://brainly.com/question/15734390

#SPJ11

Who plays Rblx?? What do yall play?

Answers

Answer:

i play rblx

Explanation:

queenloveadriana (main acc)

AdiosLoca (alt)

Azazel_Iblis (the acc I'll use for my YT channel)

I also play Fn, CofD, Destiny, 2k, Mortal Combat, but my PS4 broke and I'm waiting to get my PS5 that I ordered        

Answer:

i do

Explanation:

Which statement describes the most important reason for designing
educational software so that it places low demands on hardware?
OA. Educational software is built to be accessible to a diverse group of
people using various types of computer systems.
O B. Educational software requires less memory to operate and uses
less energy than other software.
O C. Educational software consists of low-level programming
languages to make it easier for the computer to process.
OD. Educational software needs to display and manipulate text using
only a screen and keyboard.

Answers

Time to learn, the caliber of the teachers, and the level of parental and school trust are further aspects that affect effective schools. According to research, students gain more when they learn for longer periods of time and do so as effectively as possible.

What Factors make a school effective?The topic of how to determine whether or not a school model is beneficial and how to assess efficacy still continues, despite the existence of numerous different school models. Research on the traits of successful schools is widely used. On the other hand, there is disagreement over the qualities that successful schools should possess.Researchers have suggested that a school's success should primarily be determined by its students' academic achievement. Considering that schools' only goal is to educate their students, it actually makes sense. Ineffective schools should be taken into account when measuring pupils' social traits, such as personal growth, according to other studies. Another problem with studies on school effectiveness is that they frequently draw their conclusions from studies done in inner-city or special-use schools for young children.

To Learn more About school trust refer To:

https://brainly.com/question/29088422

#SPJ1

How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an email contact in the To bar and choose from the options. 2. Click in the ribbon to open the Global Address List.

Answers

Answer:

1. AutoCorrect

2. Address book

Explanation:

stan bts ?

Answer:

1. auto correct

2. address book

Explanation:

How can you use the Address Book to address an email message? Use the drop-down menus to complete the

Pls fast just answer don’t explain

Pls fast just answer dont explain

Answers

Answer:

This is true mark brainliest

Explanation:

Answer:

true

Explanation:

which symbol is used in standard sql as a wildcard to represent a series of one or more unspecified characters?

Answers

% (percent sign) is the symbol is used in standard sql as a wildcard to represent a series of one or more unspecified characters.

What is Wildcard in SQL?

A wildcard character replaces one or more characters in a string. The LIKE operator employs wildcard characters. In a WHERE clause, the LIKE operator is used to look for a specific pattern in a column.

What is SQL?

Structured query language (SQL) is a programming language used to store and process data in relational databases. A relational database is a tabular database that stores information in tabular form, with rows and columns representing different data attributes and the various relationships between the data values. SQL statements can be used to store, update, delete, search, and retrieve data from a database. SQL can also be used to maintain and improve database performance.

To know more about SQL, visit: https://brainly.com/question/25694408

#SPJ4

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

When you send large attachments, you are not
a. considering the needs of others
b. doing anything wrong
c. helping to maintain respectful communication
d. following social conventions
Please select the best answer from the choices provided
A
ОО
B
ОС

Answers

Answer:

c,becauses she is helping

Explanation:

thank me later

Answer:

A

Explanation:

i got a 100

How to add page numbers in word without deleting header?.

Answers

Answer:

Double-click the header or the footer area (near the top or bottom of the page). Go to Header & Footer > Field. In the Field names list, select Page, and then select OK. To change the numbering format, go to Header & Footer > Page Number > Format Page Numbers.

Explanation:

---- Credit Microsoft Support

Other Questions
pls help me will mark brainliest!!! 1- An object of weight 2N is fired upwards to a height of 5 m.Calculate gain in potential energy. Lisa bought CDs that were each the same price. Including sales tax, she paid a total of . Each CD had a tax of . What was the price of each CD before tax? The width of a rectangle, in feet, is represented by (3x + 2). The length of the rectangle, in feet, is represented by (5x + 4). Find the perimeter of the rectangle you intend to prepare 500 ml of a 0.1m solution of nacl, but you forget to remove the stir bar when you bring the solution to volume. the stir bar has a volume of 1 ml and weighs 4 g. what is the percent error in your molarity? Write the point-slope form of the equation of the line satisfying each of the following conditions. Then use the point-slope form to write the slope-intercept form of the equation in function notation.Slope=4, passing through (5,8) find the value of x please i need help Need an answer in PythonWrite a program for. checking the truth of the statement (X Y Z) = X Y Z for all predicate values. The new lotion smells amazing. Identify the noun what do you conclude from the bar graph 20. what do citations for periodicals require that citations for books don't? a. year and city of publication b. author last name and page number(s) c. article title and day/month of publication d. database title and date of access Which of the following measures did the Fed use in addition to the creation of the short-term emergency lending facilities in order to inject liquidity into financial markets? O Required reserve ratio O Quantitative easing O Secondary credit O Primary credit What should you so if someone wants to talk about things that are too personal? Consider the rings rq = r[x]/(q) for q a quadratic polynomial. classify the rings rq up to isomorphism. (i.e. say when two such rings are isomorphic and when they're not.) In a one-tail hypothesis test where you reject H0 only in thelower tail, what is the p-value if ZSTAT value is -2.2?The p-value is 0.0056.The p-value is0.0139The p-value is 0.007 my grandma was a very wealthy woman. when she passed, she generously distributed all her wealth to everyone. except me. i got a $10 coupon for a local supermarket. "whatever," i thought and tried to spend it. i handed it to the cashier, and his eyes almost popped out. "dont let anyone take this from you," he said. "why? whats wrong?" i asked. "meet me in the back, and ill show you." What would be the structural diagram for the line diagram attached to the assignment?? A culture of E. coli growing in a medium containing 15NH4Cl15NH4Cl is switched to a medium containing 14NH4Cl14NH4Cl for three generations (an eightfold increase in population). What is the molar ratio of hybrid DNA ( 15N14N15N14N ) to light DNA ( 14N14N14N14N ) at this point? hi , guyswho will win icc world test championship finalindianew Zealand Why dont we have a complete fossil record of all life thats ever lived?