1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
12

Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul

a. Where will the CPU store data for easy access and quick retrieval during these computations?
A) read-only memory 
B) random- access memory 
C)  Hard disk 
D) Compact disk 
Computers and Technology
2 answers:
EastWind [94]3 years ago
8 0

Answer: B) random- access memory(RAM)

Explanation: Random-access memory is the memory unit  of the operating system that operates at high speed and can be accessed randomly The data stored in this memory can be revived till the system is on position.

According to the case mentioned in the question,Samantha can retrieve the formula stored in the form of data from RAM and use it whenever she requires it for calculation till the computer is on.This shows the volatile nature of RAM.

Other options are incorrect because read-only memory(ROM) can store data which can be only read, hard disk is non-volatile disk that stores data and compact disk(CD) stores data using light .Thus, the correct option is option(B).

MrMuchimi3 years ago
4 0
B. random-access memory
You might be interested in
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
(011001111)2=(?)10 can anyone solve this urgent <br><br> Hurry
frosja888 [35]

207.

In hex, it is 0xCF, which is 12*16+15 = 207

3 0
3 years ago
Read 2 more answers
A type of memory that is expensive and therefore is often used only in cache memory applications.
tatuchka [14]
SRAM [STATIC] is a type of memory, it is five times faster than DRAM [which is found in most computers] and it depends on the use of electricity. It is designed in such a way that its constant refreshing is not require, it is much more expensive than the DRAM and it is therefore only used in cache memory application.<span />
6 0
3 years ago
Read 2 more answers
What am I doing wrong?
Temka [501]

In your example, you're asking the user for a number and then you're setting total and nums equal to zero. This results in your first number being ignored by the program. I included the complete working code below:

num = int(input("Enter a number: "))

total = num

nums = 1

while (total <= 100):

   num = int(input("Enter a number: "))

   nums = nums + 1

   total = total + num

print("Sum: "+str(total))

print("Numbers Entered: "+str(nums))

I hope this helps!

8 0
3 years ago
A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
77julia77 [94]

Answer:

Answer: Program to estimate the power spectral density of the signal

Explanation:

fs= 4000; % Hz sample rate Ts= 1/fs; f0= 500; % Hz sine frequency A= sqrt(2); % V sine amplitude for P= 1 W into 1 ohm. N= 1024; % number of time samples n= 0:N-1; % time index x= A*sin(2*pi*f0*n*Ts) + .1*randn(1,N); % 1 W sinewave + noise

Spectrum in dBW/Hz

nfft= N; window= rectwin(nfft); [pxx,f]= pwelch(x,window,0,nfft,fs); % W/Hz power spectral density PdB_Hz= 10*log10(pxx); % dBW/Hz

Spectrum in dBW/bin

nfft= N; window= rectwin(nfft); [pxx,f]= pwelch(x,window,0,nfft,fs); % W/Hz power spectral density PdB_bin= 10*log10(pxx*fs/nfft); % dBW/bin

7 0
3 years ago
Other questions:
  • Keep the base of your _________ on the mouse pad or desk?
    12·2 answers
  • What is the outside of an iPhone called?
    9·2 answers
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Which entity has the principal responsibility to control the execution of processes?
    14·1 answer
  • Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i
    10·2 answers
  • Write a program with the total change amount as an integer input, and output the change using the fewest coins, one coin type pe
    13·1 answer
  • What role do computer play in law and order​
    6·1 answer
  • I WILL GIVE BRAINLIEST
    9·1 answer
  • Anwser the question below plz due in 15 mins.
    12·1 answer
  • Which of these is NOT an input device?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!