1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
11

What is primary storage

Computers and Technology
2 answers:
svlad2 [7]3 years ago
7 0
Typacally refers to random access memory
Paha777 [63]3 years ago
3 0
Usually it's the main hard drive.  The place data is written to first.  There may be backup storage as well, but backup storage is written to after primary storage.
You might be interested in
You have just installed a SOHO router in a customer’s home and the owner has called you saying his son is complaining that Inter
emmainna [20.7K]

Answer: A. Verify the wireless connection is using the fastest wireless standard the router supports.

D. Enable QoS for the gaming applications on the router and on the son's computer.

Explanation: Verifying the wireless connection is using the fastest wireless standard the router supports will improve line of connectivity and reduce network latency hence gaming consoles communicate faster.

QoS enables the prioritizing of the volume of internet traffic on the console for high quality gaming. QoS will also enable more internet bandwidth to be channeled to the gaming console.

6 0
3 years ago
What are the programming concepts (within or outside the scope of IT210) that you would like to strengthen and delve into furthe
marin [14]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

I would like to reinforce in advanced or complex concepts such as documents as well as channels, internet programming, multi-threading, after that last lesson.

  • I am interested in learning web development to develop applications or software. I would also like to explore those concepts by using open source tools.
  • Course concepts will have to develop models for handling.
  • No there is no subject matter or definition you provide further clarity for.
  • I'm interested in studying java as well as web development in comparison to C++ so I can use it in my contract work.
4 0
3 years ago
Survey data are collected by using all of these methods EXCEPT
castortr0y [4]

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

8 0
3 years ago
According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
nadya68 [22]

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

8 0
3 years ago
Read 2 more answers
Is jesus dead or alive
Morgarella [4.7K]

Answer:

Explanation:

i think he alive but in heaven i dunno

8 0
3 years ago
Other questions:
  • Jenny is working on a laptop computer and has notices that the computer is not running very fast. She looks and realizes that th
    6·2 answers
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • __________ are the first line of defense against unsafe drivers.
    5·1 answer
  • Working with text in presentation programs is similar to using text in other applications
    9·2 answers
  • Hewo everyone look at me I look ugly don't I<br>​
    6·2 answers
  • ASAP BRAINLIEST!!!
    6·1 answer
  • What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
    7·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!