1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
7

What is the description of a computer ram?

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
6 0
RAM is short for Random Access Memory. It is a temporary place to store data.
It is also volatile. Meaning if no power is running through it, it looses everything.

That is the purpose for hard drives and SSDs. They offer a more permanent storage solution.
You might be interested in
Help please what is the answer , thanks!!!
shepuryov [24]

Answer:

X = "Hello World"

Y = "hello world"

Z = 100

C = 200

if X == Y:

   print("TRUE")

else:

   print("FALSE")

if Z > C:

   print("TRUE")

else:

   print("FALSE")

4 0
3 years ago
Which is the responsibility of a software architect?
Zarrin [17]
The responsibility of a Software Architect is to gather and analyze requirements.   They have many responsibilities in a software team, one of them is to gather and understand the requirements from the users, analyze the technical feasibility of the design and implementation, so it could ensure that the implementation fits the project scope, budget and schedule. 
4 0
3 years ago
What used to produce protein under the direction of DNA?​
Leya [2.2K]

Genes

A gene is the section of DNA required to produce one protein.
7 0
3 years ago
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
3 years ago
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
Other questions:
  • Antivirus software products require that you update _____ on a regular basis
    6·2 answers
  • Quick question how the internet has impacted y’all life ? 5 sentences or more
    8·2 answers
  • If you want to store the information that a user types in response to the input() function, what do you need to do? (select the
    11·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • Define the role of websites in internet.also write the importance of internet in our daily life.
    6·1 answer
  • In preparing categorical variables for analysis, it is usually best to a. combine as many categories as possible. b. convert the
    14·1 answer
  • How do lung and heart work together
    12·1 answer
  • Choose the correct term to complete the sentence.
    11·1 answer
  • Integral 3t+ 1 / (t + 1)^2​
    9·1 answer
  • What is the primary language used to write web content and is the default format for Outlook messages?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!