1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
1 year ago
6

Which of the following is NOT a long-term storage device?

Computers and Technology
1 answer:
neonofarm [45]1 year ago
3 0

The storage device which is not a long-term storage device is: D. RAM.

<h3>Types of computer memory.</h3>

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include the following;

  1. Read only memory (ROM)
  2. Random access memory (RAM)

<h3>What is RAM?</h3>

RAM is an abbreviation for random access memory and it can be defined as a volatile and temporary storage (memory) location that is used for currently opened software program (application) and computer data.

In conclusion, we can reasonably and logically deduce that the storage device which is not a long-term storage device is random access memory (RAM).

Read more on RAM here: brainly.com/question/13748829

#SPJ1

You might be interested in
Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
astra-53 [7]
A.) it the best way to show how something functions
5 0
3 years ago
Read 2 more answers
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
UkoKoshka [18]

Answer:

True

Explanation:

3 0
3 years ago
You're a teacher and you've created a form letter in word that you send to the parents of the students in your class at the begi
Daniel [21]

Answer:

The letter pulls parents' names and addresses, along with the children's names, from an Excel file you get from the main office. To make your form letter word with the updated Excel file, Create a new form letter in Word and use the mail merge feature to link it to the updated Excel file.

Explanation:

7 0
2 years ago
What are some website I can watch a movie?
7nadin3 [17]

Soap2Day

All movies are free to watch

6 0
4 years ago
Other questions:
  • Explain the design and development proccess?
    15·1 answer
  • Where would you go to cancel a print job?
    15·1 answer
  • Represent the logic of a program that allows the user to enter a value for one edge of a cube. The program calculates the surfac
    10·1 answer
  • For this exercise, you are given a phrase. Return the number of time the word “dog” appears in the phrase.
    7·1 answer
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • A set of parentheses that contain zero or more arguments
    12·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • Each generation is set apart from the previous generation because of an innovation.
    6·1 answer
  • What is the term for delivering an application over the internet called?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!