1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
6

What is one of the differences between Random Access Memory (RAM) and Read Only Memory (ROM)? RAM is where files are stored, and

ROM tells the system how to do things. ROM is where files are stored, and RAM is tells the system how to do things. RAM is measured only in megabytes, and ROM is measured only in gigabytes. ROM is measured only in megabytes, and RAM is measured only in gigabytes.
Computers and Technology
2 answers:
Aneli [31]3 years ago
7 0

Answer:

(Random Access Memory) are: ROM is a form of permanent storage while RAM is a form of temporary storage.

ROM is non-volatile memory while RAM is volatile memory.

ROM can hold data even without electricity, while RAM needs electricity to hold data.

Explanation:

Dmitry [639]3 years ago
4 0

Answer:

Characteristics of RAM or ROM memory

Explanation:

RAM (Random Access Memory).  

• It is a read (R) and write (W) memory (R/W)

• Types of RAM - SDR SDRAM, RDRAM, DDR SDRAM. The difference is the speed in sending data.

• It is used for the operating system, programs and most of the software.

• Recommendations of at least 8 GB of RAM for PC and   At least 2 GB of RAM for a mobile.

ROM (Read Only Memory)

• Store instructions and data permanently

• it's read only

•  Type of non-volatile memory

• Save data and system information, settings and programs

• Types of ROM - Mask ROM, PROM, EPROM and EEPROM.

  • A PC must have at least 256 GB.

You might be interested in
What’s the purpose of balancing or monitoring your checking account?
emmasim [6.3K]
B) To help you calculate how much money you have in your account.
3 0
3 years ago
Read 2 more answers
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form se
Ratling [72]

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

8 0
2 years ago
Read 2 more answers
Which statement describes a printer driver? a) It is the configuration code that is sent to a printer to identify the operating
White raven [17]

Answer:

Option (b) is the correct and suitable answer for the above question.

Explanation:

The printer is a hardware which is used to convert the soft copy of an information to a printed copy (Hard copy) of information.

To use printer hardware a computer system needs a printer driver which is used to do the conversion from soft copy to a hard copy. Hardware printer uses only for the purpose to print the copy.

The option b says that the printer driver is used to convert the document into the form of that document which the printer can understand easily. It means conversion from soft copy to hard copy. Hence it is the right option.

The reason behind the other option which is not valid because--

Option a says that the printer driver is a code but it is a software.

Option c says that the printer driver is an interface but it is a software.

Option d says that the printer driver is a cache but it is a software.

4 0
3 years ago
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
Other questions:
  • The 'client area' of a window is the area used to display the contents of the window (thus a title bar or border would lie outsi
    15·1 answer
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • What bus carries a status signal back to the CPU?
    14·1 answer
  • Rubbing two sticks together to make a fire is an example what
    11·2 answers
  • Choose a developing country and give 3 reasons why it is a developing country ​
    15·1 answer
  • How to fix Please enable JS and disable any ad blocker
    13·2 answers
  • To read visual and audio text means
    11·1 answer
  • The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
    6·1 answer
  • The theory of logic set the foundation for what aspect of computing today?
    11·1 answer
  • You are looking at computer ads. One has a processor that is 3.64GHz. What does this mean?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!