1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
6

What is the difference between primary storage,secondary storage and offline storage what type of storage can be

Computers and Technology
2 answers:
FrozenT [24]3 years ago
5 0
The diffnce beteen prima storhnge, secoary stoge and ofne stora
Lady_Fox [76]3 years ago
5 0
Primary storage is typically memory that is volatile (meaning it requires power to keep data) and holds data that is in active use (the operating system, any applications that might be open, and user files that may be edited or read), the most common example of primary storage is RAM. Primary storage is much faster to access then any other type of storage.

Secondary storage is memory that is non volatile (which means the computer can be switched off and the storage will retain the data) and is used to store things like the operating system and any user data/applications when the computer is off, secondary storage typically has a much larger capacity then primary memory. Secondary storage examples include a hard drive or SSD.

Off-line storage is typically comprised of secondary storage devices that are stored in a separate location from the main computer, this is to ensure that in the event of an accident (e.g. A fire that damages the computer) there is a backup of the most important data. An example of off-line storage could be a service like dropbox (Note that off-line refers to not being on site and not a connection to the internet).

<span>Summary: Primary storage is fast and small, Secondary storage is large and slow, Off-line storage is secondary storage that can't (always) be written to (as the drive is in a separate location) and is more secure.</span>
You might be interested in
An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this
ohaa [14]

I just did this, its A

6 0
3 years ago
Read 2 more answers
Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a use
Umnica [9.8K]

Answer:

The answer is "True".

Explanation:

The web beacons are one of the different techniques, that are used on web pages and emails, to check whether a user has access to some unobtrusively. It is a line, that is often invisible, and typically does not exceed 1 pixel.

  • It is usually used with cookies.
  • It is also known as a small graph, which generates a request to the server for tracking service.
7 0
3 years ago
On an XBOX 360, what does it mean if you get 4 red rings on your console?
Hitman42 [59]

Answer:

C. This happened to me.

Explanation:

4 0
3 years ago
Which of the following are advantages of cloud computing?
Leona [35]
Hahahahaha lawllakad
7 0
3 years ago
Read 2 more answers
Which technology can be used as a defense against dos and ddos syn flood attacks?
Montano1993 [528]
In terms of websites, there's a service called cloud flare which can prevent DDOS attacks in websites. Other applications you would have to look up. Hopefully this helps!
6 0
4 years ago
Other questions:
  • In the mouse properties Window, you Can
    6·1 answer
  • If you “bury” a story on Digg, what have you done
    10·1 answer
  • When we put 10+ points for when we ask a question, do we loose the points we have?
    12·1 answer
  • Three uses for Auto Formatting in Word 2016.
    5·1 answer
  • In order to average together values that match two different conditions in different ranges, an Excel user should use the functi
    6·1 answer
  • What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
    10·1 answer
  • What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
    14·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that she is designing. What stat
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!