1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
4 years ago
7

Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul

a. Where will the CPU store data for easy access and quick retrieval during these computations?
A)read-only memory
B)random-access memory
C)hard disk
D)compact disk
Computers and Technology
2 answers:
Mnenie [13.5K]4 years ago
7 0

The answer is B: Random-Access Memory (RAM)

Random-Access Memory is the working memory the computer uses to store machine code and data currently or actively being used. It is always under the control of the CPU and is able to retrieve the value of any particular byte in nanoseconds.  The work of the CPU is to actively run and manipulate the code while the RAM stores that data. In this example, the CPU is responsible for the calculations. These calculations will be manipulated and then stored temporarily on the RAM for easier retrieval.


iris [78.8K]4 years ago
5 0

Answer:

The answer is B: Random-Access Memory

Explanation:

You might be interested in
You are creating a presentation and you have come to the last slide. you still have more information to add. what should you do?
ohaa [14]
If you are using Google Slides, Click the plus arrow in the top left hand corner of the webpage. That will add another slide to the presentation you are working on
7 0
3 years ago
Read 2 more answers
What button is marked with the little hollow square at the top of the right window
andrew11 [14]

Next to the close-window-button, is the minimize/maximize button
5 0
3 years ago
Read 2 more answers
A/an ________is a device used to protect computers against surges and spikes in power.
givi [52]

Answer:

1. Surge protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A surge protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both hardware and software.

4. Bad sectors are sections of the hard disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.

7 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
Please tell me about Advantages and disadvantages of technology development​
hoa [83]

Answer:

idkidkkkkkkkkkkkkkkkkk

3 0
3 years ago
Read 2 more answers
Other questions:
  • Excel 2016 is primarily what type of program?
    15·1 answer
  • Convot the following biliary number into decimal form using any method ? (1010.100)2
    8·1 answer
  • Create a cell reference in a formula by typing in the cell name or
    7·2 answers
  • Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
    8·1 answer
  • I’m stuck in a class where i don’t understand anything, it’s only been 3 days.. any tips for learning computer coding?
    12·1 answer
  • A heart murmur is caused by incorrect operation of ________?​
    7·1 answer
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, sav
    9·1 answer
  • Write a program that allows the user to enter three separate strings: a city name, a state name, and a ZIP code.
    5·1 answer
  • If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!