1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
2 years ago
8

with the aid of your own example explain how memory,registers and secondary storage all work together​

Computers and Technology
1 answer:
AnnyKZ [126]2 years ago
6 0

Memory, registers and secondary storage all work together​ so as to create or produce an ideal storage conditions.

<h3>How does memories works together?</h3>

The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.

An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.

Learn more about Memory from

brainly.com/question/25040884

You might be interested in
The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
Elza [17]

Answer:

The technique helps you explore possible risks by providing access to risk areas identified in the past is explained below in details.

Explanation:

Risk administration commences with the system of classifying risks. In this method, we examine future developments or circumstances that may influence our understanding and capacity to accomplish our aims. Risk identification incorporates estimating out where, when, how, and why such situations may happen.

7 0
3 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Discuss three ways you could (or currently do)use the excel software in your personal life.Provide examples of the why excel is
KengaRu [80]

Uses of excels

1.    Personal fitness log: log the things you eat along with its calories and record it every day. Make a pivot of the data and see how much you have consumed. Along with this, add sleep duration, and measure the number of hours that you have slept each day during the month.

2.     Budget Planner: Make a monthly budget and maintain a log of things you buy in order to keep a track of your budget. This will help to keep a track and you will be more or less in the limits of the budget allocated during the start of the month.

3.    Headache Log: If you experience frequent headaches, then log that and when there is enough data a comparison can be done.

You can make charts and other graphical representations of the data to compare and contrast your trends and can make an efficient analysis. All these features which are present in excel are not available in other applications all at one time.

8 0
3 years ago
PLEASE HELP! (12PTS)
Mrrafil [7]

I would say False, it is a personal computer and you should be able to update it yourself. ;w;

Your welcome <3

5 0
3 years ago
What are the characteristics of ineffective notes? Check all that apply. They are illegible and hard to read. They cannot be use
s344n2d4d5 [400]
Notes that are illegible and hard to read and notes that cannot be used as reference are characteristics of ineffective notes.
4 0
3 years ago
Other questions:
  • WILL MARK BRAINLYIST
    15·2 answers
  • What are some innovations that a cell phone has undergone since its original invention?
    14·1 answer
  • What effect does slow sync flash result in
    13·1 answer
  • Write a program that removes all spaces from the given input. Ex: If the input is: Hello my name is John. the output is: Hellomy
    11·1 answer
  • Help with number 12 please!
    15·1 answer
  • Select each item that represents what the Internet may be used for:
    9·1 answer
  • [c++] Write a recursive function takes a word string as input argument and reverse the word. Print out the results of recursive
    14·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • Computer applications
    9·1 answer
  • How to set horizontal text alignment​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!