1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
4 years ago
10

"running computer programs and their data are stored in ___"

Computers and Technology
2 answers:
777dan777 [17]4 years ago
6 0

Answer:

The correct answer is: Random Access Memory (RAM).

Explanation:

Random Access Memory or RAM is the physical computer memory that temporarily stores data and functions as the working memory. The more RAM a computer has, the more processes it will be able to handle faster at the same time, improving the overall performance of the system.

Lesechka [4]4 years ago
5 0

Solution:

Running computer programs and their data are stored in Rom.

ROM is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Unlike a computer's random access memory (RAM), the data in ROM is not lost when the computer power is turned off. The ROM is sustained by a small long-life battery in your computer.

You might be interested in
What is the name of the programming language created by Spu7Nix?
VMariaS [17]
The name of the programming language is “Brainfugd”
3 0
3 years ago
Read 2 more answers
Which tab is used to configure an export to PST in Outlook 2016?
Blizzard [7]

Answer:

file

Explanation:

you should go through the file so as to configure it

3 0
3 years ago
Read 2 more answers
Disadavantage of using internet?​
skad [1K]

Answer:

Radiation from the screens will damage your brain and kill brain cells.

The lights dry out your eyes and you blink a lot more.

Explanation:

5 0
3 years ago
Read 2 more answers
________ involves the use of the internet to steal important information.
Ivenika [448]
Phishing involves the use of the Internet to steal important information.
Shoulder surfing refers to people spying on other people while they are using an ATM. Skimming a credit card refers to thieves using a device in ATMs to steal information from cards. Dumpster diving refers to picking trash from dumpsters.
5 0
3 years ago
Sharon is troubleshooting a computer and wants to test the hard drive in another computer. Sharon removes the hard drive and not
andreyandreev [35.5K]

Answer:

Sharon would need a 'Molex connector' to test the hard drive she is using.

Explanation:

4 0
3 years ago
Other questions:
  • Consider the code below. Note that the catch statements in the code are not implemented, but you will not need those details. As
    11·1 answer
  • Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va
    10·1 answer
  • In excel what does sidney need to consider when creating formulas
    7·1 answer
  • How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
    15·2 answers
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • *hacked*
    12·1 answer
  • Moderate changes to existing processes falls under the _________ analysis. Business Process Automation (BPA) Business Process Im
    5·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • Which information purpose uses video from a security camera?
    15·1 answer
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!