1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
2 years ago
7

What is does ram means,??

Computers and Technology
2 answers:
jenyasd209 [6]2 years ago
7 0
It means to roughly force something into place or an ungelded boy sheep XDDD
Step2247 [10]2 years ago
4 0
Random. Access. Memory. R.A.M. Hope this helps :)
You might be interested in
An agile team has which two characteristics? (choose two. ).
DerKrebs [107]

A SAFe Agile teams are often known to be Scrum Master and Product Owner. An Agile team characteristics are:

  • A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value.

  • A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value.

A SAFe Agile team is a cross-functional group  as they are made up of about of 5-11 people who set apart, build, test, and deliver an increment of value in a short time box.

Agile team are known to be cross functional as they can define, build , test and Deploy.

See full question below

An Agile team has which two characteristics? (Choose two.)

A) A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value

B) A stand-along unit of individuals who do not require input fro other teams to complete their tasks

C) A large group of individuals who all work together to create value for the client

D) A group of dedicated individuals that work in phase-gate steps to complete their PI Objectives

E) A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value

Learn more from

brainly.com/question/24390635

5 0
2 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
2 years ago
Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform application
Tresset [83]

Answer:

Option (C) and (D) are the correct answers.

Explanation:

Because Hypervisor is an application or software that provides you a platform by which you can operate another application or software which is not supported to the current operating system just like, you can operate the mobile applications on your system with the help of Hypervisor software. In other words, it is an emulator that provides you the platform to operate different applications on your system.

8 0
3 years ago
Most search engines provide specific pages on which you can search for____ and
vazorg [7]

Answer: c

Explanation: a

7 0
2 years ago
Read 2 more answers
Other questions:
  • Discuss three ways you could (or currently do) use the Excel software in your personal or professional life. Provide examples an
    12·1 answer
  • Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
    7·1 answer
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • VOTE!
    11·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • What is polymerization1​
    11·1 answer
  • How many domains are there in the classification system?
    13·1 answer
  • What is the correct format to use when<br> inserting a date in Excel?
    15·1 answer
  • Assume the name of your data frame is flavors_df. What code chunk lets you review the structure of the data frame?
    9·1 answer
  • reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!