because cache memory is costlier than main memory and physical size of cache memory also matters.ignoring the cost , if we use large cache memory, it will take larger physical space.so mother board won't be able to accomodate it
Daniel gives more and more time to self-reflection and improves the mistakes he was doing in the last exam.
<h3 /><h3>What is self-refelection?</h3>
Reflecting on oneself is similar to gazing in a mirror and reporting what you see. It is a method of evaluating your work habits, study style, and self. To think about something is the definition of reflection, given simply.
When Daniel didn't do well on an exam, his teacher suggested that he think about his performance to see how he may perform better on the upcoming test.
Examine the material he is familiar with. Consider whether he needs to change his study strategy. Request extra assistance from the instructor outside of class.
Examine the questions he didn't get right and consider why. Self-reflection is the process of assessing one's performance to identify any problem areas that require improvement.
Hence, daniel gives more and more time to self-reflection and improves the mistakes he was doing in the last exam.
To learn more about self-reflection refer;
brainly.com/question/14754364
#SPJ1
Answer:
a, c, and d.
Explanation:
Let's examine these options:
a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.
c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.
d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.
The correct term you're looking for in this instance is capacity as it limits the amount of storage on a secondary device
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>