Primary Storage: is a computer memory that connects directly to the central processing unit of CPU. It is also known as RAM or random access memory. This storage do not permanently stores data because this is a volatile kind of storage.
Secondary storage: this may refer to storage that is non-volatile. Some examples of this storage are hard drive, CD/DVD, Flash drive, etc
Offline storage: also known as tertiary storage. This is not a very known storage, this includes jukeboxes and tape libraries.
To access the data on another computer you should use a USB, Online storage (like DropBox or Google Drive) or you can use an portable disc ( external memory )
Primary storage:
1-Processor Register
2-Processor Cache
3-CPU ( RAM )
Secondary Storage:
1-Flash Memory
2-Floppy Disc
3-CD or DVD
Off-line storage:
1-Use as a data transmission medium.
2-Serve as a good back-up de vice.
3-Provide high security because is located remotely and can be use only by one person.
Oh man i work hard for this , i had never type that much before !
Answer:
Magnetic tapes
Explanation:
The CERN research laboratory mostly store their data in Magnetic tapes which are their main storage medium. The reason behind selecting magnetic tape is that it can store huge volumes of data. It is relatively less expensive and durable for long-term storage. With the passage of time, the CERN has expanded its data centres and their centres are linked with each other through high speed fibre optic networking
Answer:
Logical, Operational
Explanation:
A data warehouse is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.
It is considered a core component of business intelligence.
Answer:
Defense in Depth (DiD).
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.
Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.
U didn’t put the choices, but zuse is a German civil engineer computer scientist. His greatest achievement was the worlds first programmable computer.