1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
7

What is the description of a computer ram?

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
6 0
RAM is short for Random Access Memory. It is a temporary place to store data.
It is also volatile. Meaning if no power is running through it, it looses everything.

That is the purpose for hard drives and SSDs. They offer a more permanent storage solution.
You might be interested in
What type of internet connection do you think you'd get in Antarctica?
rusak2 [61]
Hello!
My best guess is you would have to use mediocre satellites that float over for internet connection.
3 0
3 years ago
Read 2 more answers
The domain name system ________. Question 2 options: A) is a way to find a host's IP addresses if your computer only knows the h
ra1l [238]

Answer:

C) both a and b

Explanation:

13) The domain name system ________.

A) is a way to find a host's IP addresses if your computer only knows the host's host name

B) is a general naming system for the Internet

C) both A and B

D) neither A nor B

8 0
2 years ago
You are leading a project that will collect vast amounts of data, which will need processing. In your research, you learn about
Helga [31]

Answer:

Grid Computing

Explanation:

Grid computing is a processor architecture that combines computer resources from various domains to reach a main objective. In grid computing, the computers on the network can work on a task together, thus functioning as a supercomputer.

Cheers

5 0
2 years ago
Read 2 more answers
When computing effect size, the sample size is ________.
NNADVOKAT [17]
Sample size  is not taken into account

8 0
3 years ago
True or false? risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems
TEA [102]
Risk assessment should cover all the processes and systems included in an organization. This means this includes also the technical support including <span>firewalls, secure operating systems and networks, and antivirus protection. Risk is always present and inevitable in every way so it is important to anticipate and make early detections to counter with actions as soon as one can.</span>
5 0
3 years ago
Other questions:
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • Your friend’s parents are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    10·2 answers
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    10·1 answer
  • (20 POINTS AND BAINLIEST)
    9·1 answer
  • Convert the binary number into a hexadecimal number.
    7·1 answer
  • Which email client feature allows you to store the names and information of people you contact frequently?
    5·1 answer
  • What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
    13·1 answer
  • Which option describes wearable technology?
    9·1 answer
  • How many times do you return after the dateline ?
    12·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!