1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
15

A type of memory that is expensive and therefore is often used only in cache memory applications.

Computers and Technology
2 answers:
tatuchka [14]3 years ago
6 0
SRAM [STATIC] is a type of memory, it is five times faster than DRAM [which is found in most computers] and it depends on the use of electricity. It is designed in such a way that its constant refreshing is not require, it is much more expensive than the DRAM and it is therefore only used in cache memory application.<span />
MrMuchimi3 years ago
5 0

Answer:

The memory that is expensive and therefore is often used only in cache memory applications is <u>Static RAM (Static RAM)</u>.

Further Explanation:

Static RAM (SRAM)- SRAM is random access memory that retains the data in memory as long as the power is supplied to the system. On the other hand, DRAM stores data in the capacitor and the transistor. Static RAM is expensive and five times faster than DRAM (Dynamic Access Memory). SRAM is used in the cache memory of the computer and it is part of the RAM digital to analog converter on a video card.

SRAM holds the data in flip-flops. A flip-flops consists of 4-6 transistors having some wiring but never to be refreshed.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

Grade: Senior Secondary School

Subject: Computers and Technology

Chapter: Computer Basics

Keywords:  

Memory, type, expensive, cache memory applications, Static Random Access Memory, Dynamic Memory Access, SRAM, DRAM, transistors, resistors, capacitors, flip flops, cache memory, digital, analog, data, power supply

You might be interested in
You can create a negative indent, sometimes called a(n) ________________, by dragging the indent markers on the ruler to the lef
Murljashka [212]
B is the best answer
I hope it’s work
8 0
3 years ago
"To speed up magnetic hard drive performance , ___________ is often used. "
Harrizon [31]

Answer:

disk caching

Explanation:

Hi,

Magnetic hard drives use disk caching to speed up performance. This method is quite ingenious because what it does is that in a section of memory in your pc, it keeps a copy of information that was previously accessed in the hard disk. So, next time if the same data is requested, the system can refer to cache to get quick access rather than going to the hard disk (which is slower).

3 0
3 years ago
Java can be used to create which of the following technologies?This task contains the radio buttons and checkboxes for options.
Tom [10]

Answer:

B JSP and servlets.

Explanation:

  • Server Side Includes (SSI) is a simple interpreted server-side scripting language used almost exclusively for the web.
  • JSP and servlets; A servlet is a server-side program and written purely on Java. JSP is an interface on top of Servlets.
  • Active Server Pages (also known as ASP) is Microsoft's first server-side script engine that enabled dynamically-generated web pages.
  • Practical Extraction and Report Language (Perl) is a language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on that information.
5 0
4 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
When do you use an else statement?
tatiyna

Answer:

To tell what will happen when an if-statement is false

Explanation:

We use else statement if if-statement get false.

for example

if(a>20)

{

print "your age is greater than 20"

}

else

{

print "Your age is less than 20"

}

In the pseudo code, you see the use of else statement, that if age is greater than 20 then display message "you are age is greater than 20". if this statement get false, i.e. you are age is not greater than 20 then else statement will be executed and message will be displayed that your age is less than 20.

Why other option are not correct

To input a variable:

to get input, we use input statement of respective programming language not if-else statement.

To end an if statement

we don't use else statement to end if statement. when condition met then if statement will be ended

To handle string value

we use input validation statement to handle if statement.

8 0
4 years ago
Other questions:
  • What number is needed to complete the pattern 66, 73, 13, 21, 52,_, 10, 20?
    12·1 answer
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • George writes code for word processing applications. He is looking for a new job opportunity. What position should George look f
    5·2 answers
  • When you buy an Xbox 360 can you play online for free
    12·2 answers
  • In what year was the first mobile phone produced?
    15·1 answer
  • With a chart , illustrate the stage of wood processing plsss help I will mark u as brainliest plss help pls and I will follow yo
    15·1 answer
  • which of the following is something that an information systems (IS) professional would do? A. devise new ways to use computers
    10·1 answer
  • First person to answer gets free brainlist
    15·2 answers
  • What is the half of 3/18
    6·1 answer
  • HC - AL-Career Preparedness
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!