1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
4 years ago
10

Whats the relationship between cpu memory and disk​

Computers and Technology
1 answer:
Otrada [13]4 years ago
5 0

Answer:

See explanation below.

Explanation:

The CPU is the central processing unit. It is the heart of the computer. Every program must be presented to the CPU, step by step, for the program to run. The CPU is connected to every other part of the computer, including the RAM memory and the disk - the Hard Drive.

The Hard Drive, also known as a hard disk, provides a storage area for programs and information. Data that is stored in the Hard Drive will stay there, even when the computer is powered down.  Then, when the computer is powered up again, the programs on the Hard Drive can then begin to run in the CPU.

The RAM memory, also known as Random Access Memory, is where running programs are stored. This is because the access to the RAM is fast. The CPU can step through program processes quickly if the program is stored in RAM.

Hope this helps! Have an Awesome Day!! :-)

You might be interested in
What should you do to organize a large amount of data??
Kay [80]
Set them up from least to greatest or create a number graph with all the data.
5 0
3 years ago
Pig Latin is a nonsense language. To create a word in pig Latin, you remove the first letter and then add the first letter and "
LUCKY_DIMON [66]

Answer:

Hi there  Sandrathompson5661!  

Using Java as the language for implementation, the PigLatin translation program can simply be coded as shown below. The program uses the Scanner module in java utils package to prompt the user for input of word(s) and splits the input with any of the matching delimiters. The rule to swap the first character and append it to the end with an “ay” for a normal word, or the appending of “yay” for a vowel word, is then applied. The result is printed on the screen before the program exits.

Explanation:

import java.util.Scanner;

public class PigLatin {    

 public static void main(String[] args)     {        

   char[] delimiterChars = { ' ', ',', '.', ':', ';', '\t' };        

   String[] words_array;        

   Scanner words = new Scanner(System.in);        

   System.out.println("Please enter a word (for multiple words use any of the following delimiters {' ', ',', '.', ':', ';', '\t' }): ");        

   String input_words = words.nextLine();        

   words_array = input_words.split("[,\\s\\-:.;' '\\\t]");  

   System.out.println("PigLatin translation: ");        

   for (int i=0; i<words_array.length; i++) {

     System.out.println(makePigLatin(words_array[i]));        

   }    

 }      

 public static String makePigLatin(String word)     {        

    String vowels = "aeiou";        

    if (vowels.indexOf(Character.toLowerCase(word.charAt(0))) != -1) {          

       word = word + "yay";        

    }        

    else {          

       word = word.substring(1, word.length()) + word.charAt(0) + "ay";        

    }        

    return word;      

 }

}

7 0
3 years ago
Find at least three software programs for each of the two technologies listed below.
lakkis [162]

Answer:

Android Studio, FileZila

Explanation:

Android studio provides you with all tools you need to build a mobile application l.

FileZila is an FTP controller, you cam DELETE , SEND, RECIEVE data from it.

7 0
3 years ago
Read 2 more answers
15
valina [46]

Answer:

B.

shutter priority mode

Explanation:

Shutter Priority, which is mentioned as S on the mode dial, and the mode is  the time value, and is demoted as Tv, that points out to the setting in different forms of cameras that allows all to select a particular shutter speed, and as meanwhile the camera balances the aperture to ensure correct exposure in the image.

7 0
4 years ago
Read 2 more answers
In 2013, the national retailer Target Corporation suffered a major data breach that put the financial information of an estimate
katen-ka-za [31]

Answer:

Security Policies

Explanation:

As computer systems continue to become complex, it makes it hard for co-operates and big businesses to understand the technology that comes with it. Organizations are concerned with how risks are being handled, managed, and reduced. They therefore, expect security policies to reflect how information should be handled. Better security policies shows a company's commitment to protect data and keep the business healthy.

4 0
3 years ago
Other questions:
  • Have you ever used a device that relies solely on the cloud?
    10·1 answer
  • For an IP or device that is in the local network, it's a very straight forward cache table lookup for its MAC address. How does
    5·1 answer
  • In a programming language, a(n) ______, or command, is a word with a predefined meaning​
    6·2 answers
  • Who made the first electronic device?
    14·1 answer
  • Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their
    6·1 answer
  • Which of these is NOT a benefit of being connected 24/7?
    11·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • What information will you find in the 16-bit field in an IP datagram?
    7·1 answer
  • What do you understand by main document and data source
    15·1 answer
  • many police departments coordinate youth-oriented programs as part of their prevention efforts. which of the following is not an
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!