1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
3 years ago
12

What is the key benefit of using RAM in a computer?

Computers and Technology
1 answer:
Paul [167]3 years ago
3 0
It allows commonly used instructions to be stored for easier access, but the ram gets deleted when ever you restart the computer.
You might be interested in
True of False - use T or F The Math class can be instantiated.
Wittaler [7]

Answer:

F

Explanation:

The Math class cannot  be instantiated because it has a private constructor.

However all the methods in the java.lang.Math are static which means that you can invoke them directly without having to instantiate the class. For example:

static int abs(int a) defined in the Math class can be invoked from the calling function as:

int absolute_value = Math.abs(a);

Note that the class Math is also declared as final which means it cannot be extended by any other class as well.

3 0
3 years ago
What does error code 18 indicate?
RSB [31]

Answer:

you need to reinstall the drivers for the device

7 0
3 years ago
When do you need to use a fully qualified url in a hyperlink?
Rudiy27
When you're linking to another web site.
7 0
3 years ago
Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their per
EleoNora [17]

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them.

<h3>What is system hack?</h3>

System hacking is a term that connote when a person or a computer user has a compromise between computer systems and software that tends to access the target computer and steal their information or others.

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them as well as their privacy been exposed.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

7 0
2 years ago
Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
Zina [86]

Answer:

  General purpose graphics primitives that contain 2D graphic library as, it is used in graphics processing unit which typically manage computation for computer graphics. Graphic primitives contain basic element such as lines and curves. Modern 2D computer graphic system that operate with primitives which has lines and shapes. All the elements of graphic are formed from primitives.

8 0
3 years ago
Other questions:
  • printStars is a method that accepts a single int argument and returns no value. It prints as many stars as indicated by its argu
    9·1 answer
  • Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
    5·1 answer
  • Most internet connections use what transmission
    13·2 answers
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • What piece of equipment is NOT a tool that would be considered appropriate equipment for on-site visits? a. multimeter b. flashl
    14·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • To what does the term computer hacking refer?
    10·2 answers
  • Your friend gave you a flash drive containing photos from a weekend event. After you copy the files, you notice a bunch of .DS f
    6·1 answer
  • Create a Python program that computes the cost of carpeting a room. Your program should prompt the user for the width and length
    10·1 answer
  • Please please help ASAP it’s timed
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!