1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
15

A type of memory that is expensive and therefore is often used only in cache memory applications.

Computers and Technology
2 answers:
tatuchka [14]3 years ago
6 0
SRAM [STATIC] is a type of memory, it is five times faster than DRAM [which is found in most computers] and it depends on the use of electricity. It is designed in such a way that its constant refreshing is not require, it is much more expensive than the DRAM and it is therefore only used in cache memory application.<span />
MrMuchimi3 years ago
5 0

Answer:

The memory that is expensive and therefore is often used only in cache memory applications is <u>Static RAM (Static RAM)</u>.

Further Explanation:

Static RAM (SRAM)- SRAM is random access memory that retains the data in memory as long as the power is supplied to the system. On the other hand, DRAM stores data in the capacitor and the transistor. Static RAM is expensive and five times faster than DRAM (Dynamic Access Memory). SRAM is used in the cache memory of the computer and it is part of the RAM digital to analog converter on a video card.

SRAM holds the data in flip-flops. A flip-flops consists of 4-6 transistors having some wiring but never to be refreshed.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

Grade: Senior Secondary School

Subject: Computers and Technology

Chapter: Computer Basics

Keywords:  

Memory, type, expensive, cache memory applications, Static Random Access Memory, Dynamic Memory Access, SRAM, DRAM, transistors, resistors, capacitors, flip flops, cache memory, digital, analog, data, power supply

You might be interested in
Entering the formula =SUM(C5:C18) in cell C19 will result in which of the following?
frozen [14]
Well the result shown in C19 will show the sum of all cells from C5 to C18:
ie: C5 + C6+ C7+ C8+ C9+ C10+ C11+ C12+ C13+ C14+ C15+ C16+ C17+ C18

:)
3 0
3 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Find the titles of courses in the Computer Science department that have 3 credits. Find the IDs of all students who were taught
Kay [80]

Answer:

Explanation:

To solve this we break down the question and write the programme in steps as shown in the attachment

Download docx
4 0
3 years ago
Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
Kipish [7]

Answer:

code = 010100000001101000101

Explanation:

Steps:

The inequality yields 2^{k} - 1 > = M+K, where M = 16. Therefore,

The second step will be to arrange the data bits and check the bits. This will be as follows:

Bit position              number              Check bits            Data Bits

21                                   10101

20                                  10100

The bits are checked up to bit position 1

Thus, the code is 010100000001101000101

3 0
4 years ago
Read 2 more answers
In what way are a coffee maker and a dishwasher the same?<br><br>BY THE WAY THIS IS TEENBIZ
weeeeeb [17]
They both need electricity. Both used in the kitchen.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? Ex
    9·1 answer
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • To read visual and audio text means
    11·1 answer
  • How are modern computers different from eniac?
    5·1 answer
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • You have created a PivotChart showing sales by quarter by sales rep. Before presenting it to management, you notice thename of a
    7·1 answer
  • Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
    14·1 answer
  • I recorded a video on my windows PC, but when i tried to play it i got this message:
    6·2 answers
  • Describe some things that this person might say that might cause you to NOT hire them. Explain.
    6·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!