1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
8

________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are store

d.
a. rom
b. cpu
c. ram
d. usb
Computers and Technology
1 answer:
Ghella [55]3 years ago
6 0

Answer:

Option C: ram

Explanation:

  • Ram stands for random access memory
  • In any computing device, RAM is a hardware part which stores Operating System (OS) and all the currently running programs, so that they can reach the processor quickly when needed.
  • RAM is the main memory of a computer and it is faster than any other storage memory present.
  • RAM is volatile. Which means that as soon as the power is cut all the data is lost. So RAM can not store data permanently.
  • Basically RAM has two types namely:
  1. SRAM (static RAM)
  2. DRAM (dynamic RAM)
You might be interested in
When you insert a photo into a document, its placed at the ​
Ray Of Light [21]

either in the doc its self or in the attachment file

5 0
2 years ago
Read 2 more answers
To save the changes to the layout of a table, click the Save button on the _____.
kari74 [83]
Quick access toolbar :)))))))))
7 0
3 years ago
Q.drtrdyudoijoemrkdf
sveta [45]

Answer:

Yes

Explanation:

8 0
2 years ago
Read 2 more answers
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
Advocard [28]

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

6 0
3 years ago
Describe how computer are used in ticket counter?​
m_a_m_a [10]

Answer:

These systems are commonly used in facilities such as public libraries to ensure equitable use of limited numbers of computers. Bookings may be done over the internet or within the library itself using a separate computer set up as a booking terminal.

6 0
2 years ago
Other questions:
  • Although the original BBS system was simple, it increased people's ability to communicate
    14·1 answer
  • How can i use css/html coding to create links
    15·1 answer
  • Oday's color display devices represent color using the ______ color model.â
    13·1 answer
  • Im getting hit offline can someone help or give me some advice
    6·1 answer
  • What icons in the toolbar change the look of the presentation text? It’s either Drawing, Formatting,Presentation, or Standard
    9·2 answers
  • What is a function of Agile software development?<br>​
    7·1 answer
  • Create a Python program that computes the cost of carpeting a room. Your program should prompt the user for the width and length
    10·1 answer
  • The ______ Works on a single variable or constant. *​
    8·1 answer
  • What happened to the ten commandments tablets.
    9·1 answer
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!