1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
14

RAM

Computers and Technology
1 answer:
Alex Ar [27]3 years ago
7 0

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct answer is RAM.

RAM is used for storing programs and data currently being processed by the CPU.  So, the data in the RAM, can be easily accessible and processed by the CPU more fastly.

While Mass memory and neo volatile memory is not correct options. because these types of memory can stores a large amount of data but CPU fetch data from these memories into RAM. and, RAM can only be used by the CPU when performing operations.

You might be interested in
:(.
AnnZ [28]

Answer:

Um what?

Explanation:

Chile anyways so-

7 0
2 years ago
Read 2 more answers
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
Which is part of the dales process A customer retention B billing C cost planning D customer relations
serious [3.7K]

Answer:

D customer relations

Explanation:

A sales process is a term that describes a set of predetermined undertakings in which a salesperson perform in order to engage and put up with prospective buyer right from the first stage which is pre-approach to a closed sale.

The sale process involves the following steps:

1. Pre-approach

2. Approaching the customer

3. Determining the needs of customers

4. Introducing the product

5. Handling questions and objections

6. Closing the sale

7. Recommendation selling

8. Encouraging and follow up.

Hence, all the steps involved in the sales process deals with CUSTOMER RELATIONS. Therefore, the right answer is option D.

6 0
3 years ago
What are keyboard skills?<br><br> For test
Reptile [31]

Answer: Letter recognition

Fine motor skills

Isolated use of each finger

Bilateral coordination (using two hands together)

Eye-hand coordination

Explanation:

5 0
2 years ago
Read 2 more answers
Which of the following actions is most likely to raise legal or ethical concerns?
zavuch27 [327]

Answer:

arson, kidnapping, gun fighting

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • Your boss bought a new printer with a USB 3.0 port, and it came with a USB 3.0 cable. Your boss asks you: Will the printer work
    14·1 answer
  • Create a new file that contains a summary of the total consumption for three sectors: "Residential," "Commercial," and "Industri
    10·1 answer
  • What is the name of the interface that uses graphics as compared to a command-driven interface?
    11·1 answer
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
    9·1 answer
  • What are finger nails made of?-
    12·2 answers
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • We can save our data peremently on a
    7·2 answers
  • RDBMSs enforce integrity rules automatically. <br> a. True<br> b. False
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!