1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
6

Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po

wer.True / False.
Computers and Technology
2 answers:
brilliants [131]3 years ago
4 0

Answer:

False

Explanation:

The RAM does lose its memory when you turn off the computer, unlike hard drive which is slower but keeps memory

grin007 [14]3 years ago
3 0

Answer:

False

Explanation:

It is of importance to note that a Random-access memory is a form of computer memory that can be read and changed in any order , in other words, modified, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

You might be interested in
Which is not covered under the Computer Access Device and Computer Fraud and Abuse Act (CADCFA)? unauthorized use of federal com
Mazyrski [523]

Answer:

The correct answer to the following question is "Typewriters".

Explanation:

CADCFA seems to be the very first provision of federal laws to specifically concentrate on computer assault. These clauses continued to allow corporations to prosecute unjust workers for compensation for the misuse of confidential or sensitive information.

  • Even though we all agree that sometimes a federal worker uses the typewriters in the abundance of power, that's why it's not protected by that same act.
  • The other options are incorrect because they are all known and are covered for that given CADCFA act.
5 0
3 years ago
If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _​
kakasveta [241]

Answer:Apply a consistent look across the whole document instead of having to format each section individually.Automatically number section headers.Apply same font to the entire text body.Apply the same font to header sections.Use a consistent paragraph spacing.Pick a default color scheme for SmartArt, charts, and shapes.Pick from a number of pre-designed styles use them as your own and modify them.

Read more on Webcache.googleusercontent.com - https://webcache.googleusercontent.com/question/1639566#readmore

Explanation:

tht is the answer

7 0
3 years ago
Social media marketing began in the mid<br> 1970s <br> 1980s <br> 1990s <br> 2000s
kiruha [24]

Answer:

1990's i think

Explanation:

4 0
3 years ago
Companies use computers for which of the following?
RoseWind [281]

Answer:

Buisness,creation,advertising.

7 0
3 years ago
G=D+(A+C^2)*E/(D+B)^3 Rewrite the above formula in terms of doing concurrent processing using cobegin and coend to identify thos
jeka57 [31]

Answer:

G=D+(A+C^2)*E/(D+B)^3

p1:C^2

p2:(D+B)^3

p3:A+p1

p4:E/p2

p5: D+p3+p4

COBEGIN

P1(p1,p2)

COEND

COBEGIN

P2(p3,p4)

COEND

execute p5

Explanation:

P1, P2 are parallel processes as they are independent of each other. And p5 together with P1, P2 forms the serial list of processes, and these must be executed serially.  And we need to run as mentioned above concurrent processes under cobegin and coend. Hence the above is the required list of processes and how they are processed. Concurrent processes are listed under cobegin and coend.

4 0
3 years ago
Other questions:
  • Horses developed longer legs over time in response to pressure from predators that they needed to outrun to survive.
    10·1 answer
  • Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
    11·1 answer
  • When a cache block has been modified since being read from main memory?
    10·2 answers
  • The technological advancements allowing for
    10·1 answer
  • Sql statements that define the objects such as tables, indexes, triggers, etc. in a database are referred to as _______________
    7·1 answer
  • You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
    11·1 answer
  • A(n) ________ moves over the spinning platters to retrieve data from the hard disk.
    6·1 answer
  • Is it possible for the front and rear references in a circular array implementation to be equal?
    8·1 answer
  • Which of the following gadgets is best for making a soft-shell shape out of butter?
    15·2 answers
  • This road sign means
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!