1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
2 years ago
6

Magnetic ram (mram) uses ____ rather than an electrical charge to store data.

Computers and Technology
1 answer:
Allisa [31]2 years ago
4 0
<span>Magnetic ram (MRAM) uses magnetic charges rather than an electrical charge to store data.The MRAM is made of millions </span>magnetic "sandwiches".  Each sandwich consists of two iron plates and a thin insulating layer. One of the iron plates is a magnet which is set to a specific charge, whereas the other plate is variable and allows for the polarity to change according to the pull of the external fields.
The advantage of MRAM is that it retains data when power is turned off, offers a higher read write speed, c<span>onsumes a low level of power...</span>
You might be interested in
Which statement correctly compares blank presentations and themed presentations?
chubhunter [2.5K]

Answer:

To access blank presentations, you need to use the Insert tab on the ribbon; to access themed presentations, you  need to use the Design tab.

Explanation:

in order to make presentation, the user can select either blank presentation or themed presentation and then change it as required.

7 0
3 years ago
Read 2 more answers
Which of these is an example of a system?
lisov135 [29]

Answer:

force and a single particla of matter

4 0
3 years ago
DEFINE WHAT COPYRIGHT?
Reika [66]
Copyright is when someone is given the right to print, publish or make a film.
5 0
2 years ago
Read 2 more answers
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
What's a big question or problem in the tech field you'd like to solve and why?
aleksandrvk [35]

A big question or problem in the tech field that i would like to solve is Data security.

<h3>What is Data security ?</h3>

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

  • data encryption
  • hashing
  • tokenization

Learn more about Data security at;

brainly.com/question/17493537

5 0
2 years ago
Other questions:
  • A job posting is the best way to find out what _____ are required for a position.A.aptitudes B.hard skills C.soft skills D.dress
    10·2 answers
  • What is the purpose of the BBC option in a email?
    7·1 answer
  • Which key is used in word processors to create indentations?
    13·2 answers
  • Hunter took his sick puppy to Jade to get medication. Jade is
    14·2 answers
  • Calculate the change in RGDP if the MPC is .6 and initial spending is $500,000.
    8·1 answer
  • What happens to a data table when the formulas or variables used to create it are changed?
    9·2 answers
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • What are screenshots helpful for ?
    6·2 answers
  • Drag each tile to the correct box.
    8·1 answer
  • Describe the main roles of the communication layer, the network-wide state-management layer, and the network-control application
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!