1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
6

Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po

wer.True / False.
Computers and Technology
2 answers:
brilliants [131]3 years ago
4 0

Answer:

False

Explanation:

The RAM does lose its memory when you turn off the computer, unlike hard drive which is slower but keeps memory

grin007 [14]3 years ago
3 0

Answer:

False

Explanation:

It is of importance to note that a Random-access memory is a form of computer memory that can be read and changed in any order , in other words, modified, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZer
Ivan

Answer:true

Explanation:mark as brainliest

6 0
3 years ago
Most languages allow a specialized selection structure called the ____ structure when there are several distinct possible values
aleksandr82 [10.1K]

Answer:

CASE

Explanation:

Case Structure is a mechanism that allows different executions when there are several distinct possible values for a single variable, and each value requires a different subsequent action depending on the value of the label.

Case structure is also a conditional control structure that appears in most modern programming languages and allows a selection to be made between several sets of program statements.

8 0
3 years ago
Fordham3 Hardware is known for its consensus buying center culture. Recognizing this corporate culture, someone attempting to se
balandron [24]

Answer: (c) focus exclusively on the head of the buying center.

Explanation:

As Fordham3 Hardware is known for its consensus buying center culture, so someone attempting to sell to Fordham3 should focus exclusively on the head of the buying center.

8 0
3 years ago
Calls to the tostring( ) method emphasize the use of ____.
DaniilM [7]
<span>Polymorphic message
   
Methods in different classes with a similar function are given the same name. - Makes classes easier to use because programmers need to remember fewer method names. - Employed as much as possible. - Polymorphic message ex. is the toString method.</span>
5 0
3 years ago
Other questions:
  • Software development team leaders need blank skills to excel in directing their teams
    8·2 answers
  • Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
    5·1 answer
  • When seeking information on the internet about a variety of subjects, the most useful place to look would be
    8·2 answers
  • What commands would return all the rows and columns in the ProductCategory table?
    7·1 answer
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • Which data type is also called a binary object?
    9·2 answers
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
  • What is the main circuit board inside the computer called?CD-ROMY
    12·1 answer
  • Convertbinary(111100)to decimal​​​​
    13·2 answers
  • When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!