1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
12

Which of the following statements is true? Computer disks are volatile storage devices Volatile storage is lost when a computer

loses power. Volatile storage lasts only a few seconds. All of the above are true
Computers and Technology
2 answers:
arsen [322]3 years ago
4 0

Answer:

Volatile storage is lost when a computer loses power.

Explanation:

There are different types of storage in the computer. We have those that stores permanently like the disk while we have those that are very volatile.

The permanent storage retain storage in the event of power failure but volatile storage is lost if there is power failure. Example of volatile storage in the computer is RAM

balu736 [363]3 years ago
4 0

Answer:

Volatile storage is lost when a computer loses power.

Explanation:

Volatile storage, is storage that has not been transferred to a more long term form of storage. Volatile storage only retains its content while the system is being powered. This type of storage can be lost if power goes off and this makes evident, the need for care in storing additional data frequently as work is being done on a computer.  The most common type of volatile memory in a computer is the random access memory (RAM).

You might be interested in
Zoom meeting ID:987 6858 5587 Password:196133
Llana [10]
I might join I’m not sure tho is there gonna be a lot of ppl?
3 0
3 years ago
Read 2 more answers
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
You already know how to use lists. What is the index of 5 in the following list?
otez555 [7]
The answer is 1, the 3rd circle
5 0
3 years ago
The customer's endpoint device on the wan is called the __________________.​
Lelu [443]
<span>The customer's endpoint device on the WAN is called the Data Terminal Equipment (DTA).
WAN 
is wide area network, referring to a network that extends over a large area. DTA is an end instrument which converts information into signals.</span>
3 0
3 years ago
Ken is a table busser at a restaurant. Ken's boss has requested that instead of waiting to be told what tables need to be cleane
Vsevolod [243]
Ken can improve his initiative
5 0
3 years ago
Read 2 more answers
Other questions:
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • Special words are those words that start and end with the same letter. [14]
    12·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
  • Please help me.
    8·2 answers
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!