1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
14

RAM is usually a. secondary storage b. a static type of memory, used for permanent storage c. a volatile type of memory, used fo

r temporary storage d. an input/output device
Computers and Technology
1 answer:
PolarNik [594]3 years ago
8 0

Answer:

The correct answer to the following question will be Option C (Volatile type of memory).

Explanation:

Random Access Memory, a variety of computer's memory which could be retrieved accidentally i.e., some memory can be obtained without any of the previous bytes being touched.

  • Volatile memory is a type of a storage in computer that only retains its information or data while powering the appliance.
  • Almost all of the RAM used in Pc's for the primary storage is unstable storage.

So, Option C is the right answer.

You might be interested in
What does the R in the acronym SMART stand for??
jeyben [28]
Depending on who you ask, it is either Realistic or Relevant. Organizations that can't choose sometimes use the acronym SMARRT.
7 0
4 years ago
What makes up data encryption standard ?
galben [10]

Answer:

Data Encryption Standard Use Cases. The DES was a data security standard used to encrypt and decrypt non-classified computer data generated by the United States government and any commercial organization. The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). ... Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation. The DES is a product block cipher in which 16 iterations, or rounds, of substitution and transposition (permutation) process are cascaded.

Explanation:

If this helps can i have brainliest

8 0
3 years ago
Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common g
Stells [14]

Answer:

Community of interest  is the correct answer.

Explanation:

IDS(Intrusion Detection Systems) is protected for the intrusion's privacy through appealing to the community of interest. So, the community of interest is the number of individuals who are collectively merged or combined for the purpose of sharing their interests or values for achieving an individual goal for functioning the objective of any particular organization.

3 0
4 years ago
Note: You can use a word document to write your answers and copy-paste your answer to the area specified. a. (5 points) Convert
MrMuchimi

Answer:

EA9_{16} = 3753

CB2_{16} = 3250

(1011 1110 1101 1011 1010)_2 = 781754

(1010 1000 1011 1000 1110 1101)_2 = 11057389

(1011 1110 1101 1011 1010)_2 = BEDBA

(1010 1000 1011 1000 1110 1101)_2 =  A8B8ED

74510_8= 221416

67210_8 = 203212

Explanation:

Solving (a): To base 10

(i)\ EA9_{16

We simply multiply each digit by a base of 16 to the power of their position.

i.e.

EA9_{16} = E * 16^2 + A * 16^1 + 9 * 16^0

EA9_{16} = E * 256 + A * 16 + 9 * 1

In hexadecimal

A = 10; E = 14

So:

EA9_{16} = 14 * 256 + 10 * 16 + 9 * 1

EA9_{16} = 3753

(ii)\ CB2_{16}

This gives:

CB2_{16} = C * 16^2 + B * 16^1 + 2 * 16^0

CB2_{16} = C * 256 + B * 16 + 2 * 1

In hexadecimal

C = 12; B =11

So:

CB2_{16} = 12 * 256 + 11 * 16 + 2 * 1

CB2_{16} = 3250

Solving (b): To base 10

(i)\ (1011 1110 1101 1011 1010)_2

We simply multiply each digit by a base of 2 to the power of their position.

i.e.

(1011 1110 1101 1011 1010)_2 = 1 * 2^{19} + 0 * 2^{18} + 1 * 2^{17} + 1 * 2^{16} +1 * 2^{15} + 1 * 2^{14} + 1 * 2^{13} + 0 * 2^{12} + 1 * 2^{11} + 1 * 2^{10} + 0 * 2^9 + 1 * 2^8 +1 * 2^7 + 0 * 2^6 + 1 * 2^5 + 1 * 2^4 + 1 * 2^3 + 0 * 2^2 + 1 * 2^1 + 0 * 2^0

(1011 1110 1101 1011 1010)_2 = 781754

(ii)\ (1010 1000 1011 1000 1110 1101)_2

(1010 1000 1011 1000 1110 1101)_2 = 1 * 2^{23} + 0 * 2^{22} + 1 * 2^{21} + 0 * 2^{20} +1 * 2^{19} + 0 * 2^{18} + 0 * 2^{17} + 0 * 2^{16} + 1 * 2^{15} + 0 * 2^{14} + 1 * 2^{13} + 1 * 2^{12} +1 * 2^{11} + 0 * 2^{10} + 0 * 2^9 + 0 * 2^8 + 1 * 2^7 + 1 * 2^6 + 1 * 2^5 + 0 * 2^4 + 1*2^3 + 1 * 2^2 + 0 * 2^1 + 1 * 2^0

(1010 1000 1011 1000 1110 1101)_2 = 11057389

Solving (c): To base 16

i.\ (1011 1110 1101 1011 1010)_2

First, convert to base 10

In (b)

(1011 1110 1101 1011 1010)_2 = 781754

Next, is to divide 781754 by 16 and keep track of the remainder

781754/16\ |\ 48859\ R\ 10

48859/16\ |\ 3053\ R\ 11

3053/16\ |\ 190\ R\ 13

190/16\ |\ 11\ R\ 14

11/16\ |\ 0\ R\ 11

Write out the remainder from bottom to top

(11)(14)(13)(11)(10)

In hexadecimal

A = 10; B = 11; C = 12; D = 13; E = 14; F = 15.

(11)(14)(13)(11)(10)=BEDBA

So:

(1011 1110 1101 1011 1010)_2 = BEDBA

ii.\ (1010 1000 1011 1000 1110 1101)_2

In b

(1010 1000 1011 1000 1110 1101)_2 = 11057389

Next, is to divide 11057389 by 16 and keep track of the remainder

11057389/16\ |\ 691086\ R\ 13

691086/16\ |\ 43192\ R\ 14

43192/16\ |\ 2699\ R\ 8

2699/16\ |\ 168\ R\ 11

168/16\ |\ 10\ R\ 8

10/16\ |\ 0\ R\ 10

Write out the remainder from bottom to top

(10)8(11)8(14)(13)

In hexadecimal

A = 10; B = 11; C = 12; D = 13; E = 14; F = 15.

(10)8(11)8(14)(13) = A8B8ED

So:

(1010 1000 1011 1000 1110 1101)_2 =  A8B8ED

Solving (d): To octal

(i.)\ 74510

Divide 74510 by 8 and keep track of the remainder

74510/8\ |\ 9313\ R\ 6

9313/8\ |\ 1164\ R\ 1

1164/8\ |\ 145\ R\ 4

145/8\ |\ 18\ R\ 1

18/8\ |\ 2\ R\ 2

2/8\ |\ 0\ R\ 2

Write out the remainder from bottom to top

74510_8= 221416

(ii.)\ 67210

Divide 67210 by 8 and keep track of the remainder

67210/8\ |\ 8401\ R\ 2

8401/8\ |\ 1050\ R\ 1

1050/8\ |\ 131\ R\ 2

131/8\ |\ 16\ R\ 3

16/8\ |\ 2\ R\ 0

2/8\ |\ 0\ R\ 2

Write out the remainder from bottom to top

67210_8 = 203212

8 0
4 years ago
While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email se
Paul [167]

Answer:

The answer is D Check workstations on Lan for APIPA configuration.

Explanation:

1)

While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email server connected to the private LAN.

Pinging the email server form several workstations on the LAN results in 0% packet loss.

Check workstations on Lan for APIPA configuration next step the technician should take in troubleshooting the issue.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Namespaces cannot have namespaces as members.<br><br> True<br><br> False
    7·1 answer
  • 1. Provide Java code for a simple class of your choice. Be sure to include at least one constructor, two methods and two fields.
    14·1 answer
  • The Classic Triangle Testing Problem, (Myer's Triangle): A program reads three integer values. The three values are interpreted
    10·1 answer
  • Identify the characteristics of logic problems.select all that apply
    5·1 answer
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
    12·1 answer
  • "Packet switches have multiple links attached to them. For each attached link the packet switch has a/an ____________, which sto
    7·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • Please help explain this calculator code.
    13·1 answer
  • Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!