1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
4 years ago
10

"running computer programs and their data are stored in ___"

Computers and Technology
2 answers:
777dan777 [17]4 years ago
6 0

Answer:

The correct answer is: Random Access Memory (RAM).

Explanation:

Random Access Memory or RAM is the physical computer memory that temporarily stores data and functions as the working memory. The more RAM a computer has, the more processes it will be able to handle faster at the same time, improving the overall performance of the system.

Lesechka [4]4 years ago
5 0

Solution:

Running computer programs and their data are stored in Rom.

ROM is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Unlike a computer's random access memory (RAM), the data in ROM is not lost when the computer power is turned off. The ROM is sustained by a small long-life battery in your computer.

You might be interested in
If you have a database with birthdates, and you would like to find everyone who was born before June 16, 1967, what would you en
Tcecarenko [31]

Answer:

<June 16,1967

Explanation:

7 0
3 years ago
Read 2 more answers
Nikki sent flyers in the mail to all houses within the city limits promoting her computer repair service what type of promotion
Jlenok [28]

Direct marketing (APEX)


6 0
3 years ago
Read 2 more answers
You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
liq [111]

Answer:

Tunneling

Explanation:

A networking protocol that is used to send data from one network to another network by encapsulation process.

It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.

8 0
3 years ago
reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
Kaylis [27]

The usage of hosted services such data storage, servers, databases, networking, and software through the internet is referred to as cloud computing.

Since the advent of cloud computing, the number of cloud-based IT services and apps has exploded around the globe and is still growing. By 2021, practically all of the small and major applications we use will be stored in the cloud, saving us money, time, and storage space. The sorts of cloud computing are covered in this article, along with ten trends to look out for in 2021. The back-end layer is composed of computers, servers, central servers, and databases, as well as software. This layer, which is the foundation of the cloud, is only in charge of safely storing data.

Learn more about database here-

brainly.com/question/6447559

#SPJ4

6 0
1 year ago
Do all the OSs provide support for multiprocessing?
Zigmanuir [339]

Answer: No, not all the OSs provides facilitation working with multiprocessor.

Explanation: Multiprocessing is the executing different tasks at the same point of time within a system through two or more processors. Multiprocessing is not supported by the single processor operating system(OS) .

Single processor system cannot operate several tasks at the same time and cannot run the processes simultaneously.But, most of the modern operating system are designed in a way that it can support multiprocessing.

4 0
3 years ago
Other questions:
  • When parking ur vehicle facing downhill with a curb, you should point ur front wheels?
    7·2 answers
  • Identify the mobile device deployment option that gives the user flexibility to select a device, but allows the company to contr
    5·1 answer
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    6·2 answers
  • Given: an int variable k, an int array current Members that has been declared and initialized, an int variable memberID that has
    11·1 answer
  • Containers for contaminated sharps must have several characteristics. What’s missing from the list? PuContainers for contaminate
    5·2 answers
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Hjnjjjhhbbfg66ui998876dch
    8·1 answer
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • Helppppppppppp please
    5·2 answers
  • Set of general format used to write program in any programming language?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!