1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
5

When you are working on an unsaved document on a PC, where is the document temporarily saved?

Computers and Technology
1 answer:
Serga [27]3 years ago
3 0

Answer:

RAM

Explanation:

RAM or Random Access Memory is a volatile storage memory which means if a power is turned off and turned on again it will be clear, that is why, if we do not save our work and a power failure occurs, our data is lost. It is where all our running programs are located while we are working. There is another memory, which is ROM(Read Only Memory). This is a non-volatile storage and saved work is stored in ROM.

You might be interested in
Which command group on the Slide Master tab is used to add headers, footers, and other placeholders to the slide
Vikki [24]

Answer:D

Explanation:

7 0
2 years ago
Read 2 more answers
How do you use loops in code?
Keith_Richards [23]

Answer:

A loop in a computer program is an instruction that repeats until a specified condition is reached. In a loop structure, the loop asks a question. If the answer requires action, it is executed. ... A computer programmer who needs to use the same lines of code many times in a program can use a loop to save time

Explanation:

4 0
3 years ago
The ASE certification system uses _______ testing and an evaluation of on-the-job experience to confirm that a technician meets
erma4kov [3.2K]
 MY answer would be A or C .Hope this helped
7 0
3 years ago
Read 2 more answers
1 MB equals to how many GBs? Or 1 GB = how many MBs? i want to know how many MBs equal a GB, or how many GBs equal a MB; i'm get
Deffense [45]
Approximately 1,000 MBs are in a gigabyte
5 0
3 years ago
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Other questions:
  • When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
    5·1 answer
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space.
    7·1 answer
  • When planning a presentation, there are several factors you need to consider. Which of the following is one factor you should co
    8·1 answer
  • A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slo
    5·1 answer
  • Nathan wants to create multiple worksheet containing common formatting styles for his team members. Which file extension helps h
    9·1 answer
  • My brainly is no hello friend , i need you can you help me, please okay
    13·2 answers
  • ANSWER QUICKLIY
    5·2 answers
  • What is the advantage of learning through story compared to learning through personal experience?
    15·2 answers
  • EXPLAIN WHY CRYPTOCURRENCIES ARE NOT RELIABLE.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!