1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
13

Computers process information consistently for all transactions. This creates a risk that:______

Computers and Technology
1 answer:
Anna007 [38]3 years ago
6 0

Answer:

b. erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.

Explanation:

Because of the consistent nature of processing in computers, this is capable of creating certain kinds of risk. From the option, one of the probable risk that can result from consistent information processing for multiple transactions at the same time is erroneous processing. This can therefore lead to a pile of misstatements in only a short period of time.

You might be interested in
To open computer manger you would
Irina18 [472]
"start", "control panel", "administrative tools", "computer management" thats it
8 0
3 years ago
Ram and hard disks are both forms of data storage. How are they alike? How are they different? In particular, discuss the relati
saw5 [17]

solution:

RAM takes the form of computer chips — integrated circuits — that are either soldered directly onto the main logic board of your computer, or installed in memory modules that go in sockets on your computer’s logic board.

RAM stands for Random Access Memory. The data stored in RAM can be accessed almost instantly regardless of where in memory it is stored, so it’s very fast – milliseconds fast. RAM has a very fast path to the computer’s CPU, or central processing unit, the “brain” of the computer which does most of the work.

Computers need some form of non-volatile storage: A place data can stay even when the computer isn’t being used, so you don’t have to reload and re-enter everything each time you use the computer. That’s the point of having storage, in addition to RAM.

Storage for the vast majority of computers in use today consists of a hard disk drive. Hard drives can provide hundreds or thousands of gigabytes of space that can be used to store applications, documents, data and all the other stuff you need to get your work done

Storage is slower than RAM. Hard disk drives are mechanical devices, so they can’t access information nearly as quickly as memory does. And storage devices in most personal computers use an interface called Serial ATA (SATA), which affects the speed at which data can move between the drive and the CPU.

They affects our computer by these ways

RAM, the most serious bottleneck to improving performance in your computer can be your storage. Even with plenty of RAM installed, computers need to write information and read it from the storage system – the hard drive or the SSD.

Hard drives come in different speeds and sizes. Many operate at 5400 RPM (their central axes turn at 5400 revolutions per minute). You’ll see snappier performance if you can get a 7200 RPM drive, and some specialized operating environments even call for 10,000 RPM drives. Faster drives cost more, are louder and use more power, but they exist as options.


3 0
3 years ago
High-speed memory that reduces the frequency of access by the CPU to conventional memory is called: a. local memory b. cache mem
mestny [16]

Answer:

B. Cache memory.

Explanation:

A cache memory, a special type of random access memory, is a memory that is easily accessibly by a system's CPU (or microprocessor) more quickly than even the regular random access memory. It serves as a buffer between the RAM and the processor. Frequently and commonly used data, programs and applications are temporarily stored in the cache memory so that they are readily accessible and available to the processor. It is as a matter of fact the fastest memory in a computer.

The cache memory comes in three levels - L1, L2 and L3.

L1 cache are often built into the computer's core(s). They are generally small in size between 8KB and 64KB.

L2 and L3 caches are larger than the L1 cache and most times are separate from the CPU.

7 0
3 years ago
How does block chain support data privacy?
alexdok [17]

Answer:

Blockchain transactions allow users to control their data through private and public keys, allowing them to own it. Third-party intermediaries are not allowed to misuse and obtain data. If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it.

Explanation:

hope it helps you

8 0
2 years ago
Give an example of an embedded systems application.
Gala2k [10]

Answer:

A clock in the mobile phone

Explanation:

a clock is a computer in a mobile phone which is a computer,hence it's a computer in a computer

7 0
3 years ago
Other questions:
  • ​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around th
    14·1 answer
  • The idea behind ____ is that the peripheral can simply be plugged in and turned on, and that the computer should dynamically rec
    10·1 answer
  • Why are specification for food processing tool,equipmentand untensils necessary?​
    8·1 answer
  • 1. Print out the string length of s1 2. Loop through characters in s2 with charAt() and display reversed string 3. Compare s2, s
    6·1 answer
  • Write the following arithmetic expression as a valid C arithmetic expression: x = x + number
    9·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • Jackie created a poster for a rock band. Which file format will best preserve the graphics? 20PTS​
    14·2 answers
  • Which of the following is among the ComScore Ad Metrix Reports?
    12·1 answer
  • When you save a presentation with a .potx file extension, which type of powerpoint file is created?
    8·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!