1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
6

Magnetic ram (mram) uses ____ rather than an electrical charge to store data.

Computers and Technology
1 answer:
Allisa [31]3 years ago
4 0
<span>Magnetic ram (MRAM) uses magnetic charges rather than an electrical charge to store data.The MRAM is made of millions </span>magnetic "sandwiches".  Each sandwich consists of two iron plates and a thin insulating layer. One of the iron plates is a magnet which is set to a specific charge, whereas the other plate is variable and allows for the polarity to change according to the pull of the external fields.
The advantage of MRAM is that it retains data when power is turned off, offers a higher read write speed, c<span>onsumes a low level of power...</span>
You might be interested in
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
Temka [501]

Answer:

When you go out to open a web page then you should know that It’s not the OSI model that comes into the picture, and in fact, it is just for study purposes, and it does not work in real network work, The exact one used is the TCP/IP model. However, the OSI model separates the concepts into various layers, and hence used for study purposes.

When you try to open a web address through a web browser, then the web browser uses the HTTP that is an Application layer protocol.

The web browser thus finds the IP address of the URL through the Domain Name System. And this is as well the Application layer protocol.

However, you will find that the actual process is even more complex.

The browser now forms an HTTP packet which mentions, “Hello I would like to get the web page from the server”. Now the browser sends the HTTP packet to the TCP, which stands for Transmission control protocol, and is a transport layer protocol.

Here the adjacent layer interaction works. However, that is on the same device, and currently, the packet is on your PC only. The ALI states that the higher layer asks the next lower layer protocol to get done the service, and the lower layer delivers the service to the higher layer just above it. And this interaction gets repeated until the data finds itself at the lowest layer.

The main job of the TCP is to create a pipe in between you and the server, such that the data can be transferred via the pipe. And for this the TCP on your PC talks to the TCP on the server.

Now the TCP puts up its details over the HTTP packet. And these are necessary for managing the pipe/session.

Now the packet is handed to the IP process or the internet protocol, which is an internet layer protocol. The main task performed by the IP is addressing and routing. It's like a postal service, that routes the letter via various postal offices to reach the correct one. IP now puts its info on top of the TCP packet. This info is required for routing on the internet.

The packet is now handed over to the network access or the network interface layer. And this defines the hardware and protocols that are required for delivering the data via the physical network. The majority of the times the physical network used is the Ethernet.

Your PC now binds the IP packet in between the Ethernet header and the Ethernet trailer, and thus forms an Ethernet frame. You should know that Ethernet has a MAC address that is being made use of for sending the frame within the LAN.  And now the PC transmits the Ethernet frame bits physically with the help of the electricity that flows through the Ethernet Cables.

The packet now reaches the server. The web server recreates the bits through the interpretation of the electrical signals. And the webserver now removes and discards the ethernet header and trailer from the ethernet frame, and de encapsulates it. And in the same manner, it reads through the TCP data, and finally transfers that to the HTTP process which can figure out the HTTP get request.

Now the webserver in s similar manner sends back the detail. And this process can be repeated any number of times.

Also, keep in mind that in case of secure website, there is one extra step, and that is the verification of the SSL certificate, at both the client and server end. Rest of the process is same.

Explanation:

Please check the answer section.

6 0
3 years ago
The video game machines at your local arcade output coupons depending upon how well you play the game. You can redeem 10 coupons
Lilit [14]

Answer:

coupons = int(input("Enter the number of coupons you win: "))

candy_bars = int(coupons / 10)

gumballs = coupons % 10

print("Candy bars: " + str(candy_bars) + ", Gumballs: " + str(gumballs))

Explanation:

*The code is in Python.

Ask the user to enter the number of coupons

Calculate the number of candy bars, divide the coupons by 10 and typecst the result to int

Calculate the number of gumballs, use the modulo to find the remainder

Print the values

3 0
3 years ago
Importance of availability of mobile devices content that is of interest for users.
Pepsi [2]

Answer:

 The importance of the availability of the mobile device content for the users is that during the less space in the mobile device, sometimes users want to see the useful information their mobile device so that is one of the interest of the users.

By providing the content result which the user searched for the particular information then, it is the good usuage of the device.

If we present the information or data in much precise and specific manner then, it is very helpful for the users and it also reduce the complexity in the system.

7 0
4 years ago
DO NOT JOIN ANY Z O O M MEETINGS FROM THIS PERSON! IS A TRAP Please help me get them banned!!!!!
s2008m [1.1K]

Answer:

how do i help?

Explanation:

7 0
3 years ago
Read 2 more answers
Specify either "Write Through" or "Write Back" as the policy which best corresponds to each of the conditions below.
Mariulka [41]

Answer:

1. Write through

2. Write back

3. Write back

4. Write through.

Explanation:

The answers are given accordingly as above.

4 0
4 years ago
Other questions:
  • Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker’s
    12·2 answers
  • In one to two sentences, describe one method for launching or opening a program.
    5·2 answers
  • Define the following concepts: computer network, network architecture, protocol, and multilayer protocol.
    11·1 answer
  • When you're working with a word processing document and you press the del key, what happens?
    6·2 answers
  • What is the multiple source test
    15·1 answer
  • Write a for loop that prints the values 1 2 4 8 16 32 64 by increasing the value of a counting variable by a factor of two in ea
    15·1 answer
  • 2.3 Code Practice: Question 1
    5·1 answer
  • How tractors are controlled
    8·2 answers
  • How is video compression accomplished?
    14·1 answer
  • The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!