1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
8

g Define memory hierarchy. A. The rate at which information can be transferred from one place to another. B. Ordering storage sy

stems according to their speed, capacity, and cost. C. When the CPU tries to read from a memory location and it has to wait for the information to be retrieved from main memory. D. An I/O device, such as a keyboard, that is used to control a computer. E. A circuit that interfaces between a peripheral device and a bus connected to the CPU.

Computers and Technology
1 answer:
andrew-mc [135]3 years ago
3 0

Answer:

The correct option is B.

Explanation:

Memory hierarchy is the ordering of storage systems according to their speed, capacity and cost.

The hierarchy consist of Register as the top, followed by cache, then main memory, secondary memory and external storage. As you go down the hierarchy, the speed decreases, the size increases and the cost decreases also.

Memory hierarchy diagram is attached for reference.

You might be interested in
Why did industrial revolution begin Britain?​
allochka39001 [22]

Answer:

Britain also happened to have a wealth of coal, iron, and other resources in a relatively small area, which would help kick-start the Industrial Revolution. Its growing Colonial Empire also provided a ready-made (and captive) market for surplus goods, providing further impetus for entrepreneurs and new industrialists

7 0
1 year ago
Read 2 more answers
What is the primary purpose of the software package offered by hyper-v called guest integration services?
zysi [14]

Solution:

Guest integration services resolves compatibility issues of certain guest operating systems experiencing non-functioning features.

Data integration service is the employment of a group of services that comply with service-oriented architecture. Data integration service can perform in an N -> 0 latency time period. At the same time, it offers a powerful set of transformation processes for meeting an array of business imperatives. The advantages of employing data integration as an enterprise service include reduced time for marketing, a reduction in total cost of ownership (TCO), and a solution to the obsolete and expensive data-integration patterns presently available in corporate businesses.

This is the required answer.

6 0
3 years ago
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
Bella wants to be a chemical engineer and work for an oil company. Which best describes her career goals?
Gemiola [76]
<span>She wants to work in natural resources.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • Pls help me
    5·1 answer
  • Write a program that declares a constant named QUARTS_IN_GALLON which holds the number of quarts in a gallon (4). Also declare a
    8·1 answer
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • I dont understand this at all! PLZ help me
    14·1 answer
  • NAME SEARCH In the Chap07 folder of the Student Sample Programs, you will find the following files: GirlNames.txt—This file cont
    10·1 answer
  • Application area of word processor?​
    8·2 answers
  • Which of the following database object hold data?
    13·2 answers
  • Prior to the 1996 NEC, ____ receptacles and cords were permitted. However, now it is mandatory that a separate equipment groundi
    11·1 answer
  • When a single controller device communicates with multiple peripheral devices, what wires are simultaneously connected to all de
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!