1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
4 years ago
10

• What is the difference between primary storage, secondary storage, and off-line storage

Computers and Technology
1 answer:
sergiy2304 [10]4 years ago
3 0


Primary storage refers to your RAM it is internal storage.

Secondary storage is any storage that is not the primary storage that permanently stores data. Examples are hard drive, tape disk drive, floppy disk drive  and compact disk drive. 

Off-line storage refers to any device that stores data that is not permanently attached to the computer. Example flash drives, The data remains on the storage device and can be connected to a different computer. 

You might be interested in
It is a set of computer instructions​
soldier1979 [14.2K]

Answer:

computer software is a set of computer instructions

8 0
3 years ago
Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Re
asambeis [7]

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.

5 0
3 years ago
Which of these has led to the evolution of mobile marketing?
Nana76 [90]
D. using cell phones in a work place. when cell phones came out with apps and games people started paying more attention to the social media apps and their games then their own job, hope this helps :)
5 0
3 years ago
Paul has been working long hours. He is tired and distracted by family issues,
azamat

Answer: Option (B)

Explanation:

Data leakage is referred to as or known as an unauthorized transmission or broadcast of data and information from one source or an organization to any external recipient. This terminology can be also used in order to describe information and data which is transferred physically or electronically. These data leakage threats tend to usually or mainly take place through email or the web, but can take place through several other data storage devices.

7 0
3 years ago
Assume the availability of class named Date Manager that provides a static method, print Todays Date, that accepts no arguments
anygoal [31]

Answer:

DateManager.printTodaysDate();

Explanation:

As class named "DateManager" which will call the "printTodaysDate()"  static function.Static method are those who are accessed by the classname not by the object .

  • As printTodaysDate(); is a static method it means it cannot hold non static data.It hold only the static data,We cannot used super keyword in the  printTodaysDate(); function.
  • So the statement DateManager.printTodaysDate(); calls print Todays Date.
3 0
3 years ago
Other questions:
  • Create a test that prompts a user to enter a 5-digit PIN in the main procedure and then calls Validate PIN procedure to validate
    12·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • A type of backlight technology most commonly used in modern laptop devices is called____________.
    9·1 answer
  • What is obtained after processing data?​
    8·1 answer
  • ____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
    11·1 answer
  • You need to write a class called SingleItemBox (in a file called SingleItemBox.java that you create). This class has a construct
    6·1 answer
  • I have a PTCL Router. When I reset it it stops working. So if I backup its settings and use them after reset will my PTCL Work
    13·2 answers
  • What does place value mean with binary?
    6·1 answer
  • Most presentations use text:
    5·1 answer
  • What is a Type 10 SD card?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!