1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
10

Random access memory (ram) is also sometimes called _____ storage.

Computers and Technology
1 answer:
Vadim26 [7]3 years ago
7 0
It is also sometimes called Volatile storage
You might be interested in
Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
ycow [4]
Here i found this link that might help!
https://study.com/academy/lesson/the-differences-between-fuses-circuit-breakers.html

Have a nice day!
3 0
4 years ago
If you want to change the name or file type of an existing word processing document, what command should you use?
mezya [45]
I think that the answer is "save as"
8 0
3 years ago
Read 2 more answers
What does usb stand for
e-lub [12.9K]
Universal Serial Bus
8 0
3 years ago
Read 2 more answers
Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four
PSYCHO15rus [73]

Answer: Find answers in the attachments

Explanation:

3 0
4 years ago
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
Other questions:
  • Which of these are characteristics of compiler software? Check all of the boxes that apply. Compiler software compiles code. Com
    11·2 answers
  • Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr
    13·1 answer
  • . Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
    13·1 answer
  • Give a linear-time algorithm to sort the ratios of n given pairs of integers between 1 and n. I.e., we need to sort, within O(n)
    5·1 answer
  • Does the Main Content (MC) of a web page include searchboxes?
    8·2 answers
  • Survey data are collected by using all of these methods EXCEPT
    12·1 answer
  • Which of the following is the most abstract?
    13·2 answers
  • Providing captions and transcripts for videos on your website is a way of ensuring what?.
    7·1 answer
  • Giving brainliest to the Person finishes this song lyric.
    7·2 answers
  • This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!