1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
14

Discuss the differences between permanent internal memory and volatile internal memory.

Computers and Technology
1 answer:
Eddi Din [679]3 years ago
7 0
Permanent Internal Memory
1: Low Cost 
2: Data Travel Speed slow 
3: Data Storage Capacity is very High Like Gaga Bytes, Tera Bytes
4: Examples Magnetic Disk, Hard Disk
5: if Data Loss Then we recover it Easily.
6: If Computer off Suddenly then no loss of Data.
 Volatile Memory
1: High Price as Compared to Internal Storage
2: High in Speed
3: If Computer Shut down then data will be loss.
4: Examples, RAM (Randaom Access Memory) etc
5: its is also called Main Memory.
6: No Process run without RAM.





You might be interested in
Name 8 different types of packages that are widely used​
Orlov [11]

Answer:

Poly Bags ...

Paperboard Boxes. ...

Paper Bag. ...

Bottle & Cap Packaging. ...

Corrugated Boxes. ...

Plastic Boxes. ...

Side Gusset Bags. ...

Rigid Boxes

Explanation:

5 0
4 years ago
What the benefit is of folders when working with files
Aleksandr [31]
There are many benefits to using folders when working with lots of files.  Here are a few examples:

- You can use folders to sort your files by type, almost like drawers in a desk, so you might have folders for Music, Photographs, Documents, etc.

- You can use folders to group files together into a specific group.  For example in your Photographs folder you might have a folder titled BirthdayPhotographs for all the photographs from your birthday.

- As in the example above you can nest folders to create sub-categories.  Documents might include folders for Homework, Stories, Poems

- Folders can have different permissions applied to them, allowing you to keep personal files in a private folder only you can access, or secret files in a folder that doesn't show up in the normal list of folders!
4 0
4 years ago
Read 2 more answers
Which are types of lines? Choose three answers.
alekssr [168]
Straight
Curvilinear
Rectilinear
7 0
3 years ago
For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
m_a_m_a [10]

Answer:

All flags are On ( c, z , N  )

Explanation:

Given data:

4-bit operation

Assuming 2's complement representation

<u>Determine status flags that are on after performing </u> 1010+0110

    1   1

    1  0   1  0

    0  1   1  0

  1  0 0 0 0

we will carry bit = 1 over

hence C = 1

given that: carry in = carry out there will be zero ( 0 ) overflow

hence V = 0

also Z = 1      

But the most significant bit is  N = 1

8 0
3 years ago
Why should a linked list node be separate from the element stored on the list?
Daniel [21]

Explanation:

A linked list node should be separated from the element stored in the list because it is not reasonable to assume that the each object that we may want insert in the collection can be architectured to cooperate with the collection implementation.

Also the details of the implementation are to kept distinct from the user of that collection , including the elements that the user wants to add to his collection.

8 0
3 years ago
Other questions:
  • Mutual authentication for multiple services is also known as _______.
    12·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • What does nat stand for? network access trigger network administration timetable network address translation network association
    13·1 answer
  • What is a googleplex?
    7·1 answer
  • Michael is trying to remember his friend’s new cell phone number. He repeats it in his mind until he gets the new number entered
    8·2 answers
  • Which of these consoles had a 64-bit architecture
    10·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • What data type would you use for a decimal number?* ​
    9·1 answer
  • What is a banner grab?
    12·1 answer
  • What is keyword density?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!