1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
14

RAM is usually a. secondary storage b. a static type of memory, used for permanent storage c. a volatile type of memory, used fo

r temporary storage d. an input/output device
Computers and Technology
1 answer:
PolarNik [594]3 years ago
8 0

Answer:

The correct answer to the following question will be Option C (Volatile type of memory).

Explanation:

Random Access Memory, a variety of computer's memory which could be retrieved accidentally i.e., some memory can be obtained without any of the previous bytes being touched.

  • Volatile memory is a type of a storage in computer that only retains its information or data while powering the appliance.
  • Almost all of the RAM used in Pc's for the primary storage is unstable storage.

So, Option C is the right answer.

You might be interested in
What are the 49 questions for creat and edit Excel assessment​
castortr0y [4]

Answer:

1. What is the keyboard shortcut key to lock cell references in a formula

2. What are the shortcut keys for Auto Sum?

3. What are the shortcut keys to insert a new row in an Excel spreadsheet?

4. What are the shortcut keys to group rows so you can expand/contract a section of data?

5. Which of the following Excel features allows you to select/highlight all cells that are formulas?

6. What are the keyboard shortcut keys to paste special?

7. Assuming cell A1 is displaying the number "12000.7789". What formula should be used to round this number to the closest integer?

8. What are the keyboard shortcut keys to edit formula in a cell?

9. What are the keyboard shortcut keys to insert a table?

10. In which tab of the ribbon can you change Workbook Views to Page Break Preview?

11. What is the best practice for financial modeling in excel?

12. Which of the following features cannot be found in the Data ribbon?

13. The shortcut keys to increase the number of decimal places are

14. What are the shortcut keys to open up the Find and Replace window?

15. Which tab of the ribbon should you go to for removing grid lines on a worksheet?

16. What is a cell address in Excel?

17. What do you mean by Relative cell referencing and Absolute cell referencing in MS Excel?

18. How can you restrict someone from copying a cell from your worksheet?

19. How is a Formula different from a Function in Excel?

20. Mention the order of operations used in Excel while evaluating formulas.

21. What is the difference between count, counta, and countblank?

22. What is the shortcut to add a filter to a table?

23. How can we merge multiple cells text strings in a cell?

24. How many report formats are available in Excel?

25. What is a Pivot Table?

26. How do you find duplicate values in a column?

27. How can you remove duplicate values in a range of cells?

28. What are the wildcards available in Excel?

29. What is Data Validation? Illustrate with an example.

30. How do you create a column in a pivot table?

31. How does a Slicer work in Excel?

32. What are macros in Excel?

33. What is the What-If Analysis in Excel?

34. What is the difference between a function and a subroutine in VBA?

35. What is the difference between This Workbook and Active Workbook in VBA?

36. How do we check whether a file exists or not in a specified location?

37. Write a VBA function to calculate the area of a rectangle.

38. Write a VBA function to check if a number is a prime number or not.

Explanation:

I think these questions are enough for you.

4 0
2 years ago
A_________is a way for students to keep track of information during research.
Fudgin [204]
Note pad your welcome


4 0
3 years ago
By arranging users into security groups, it is possible to set permissions at a group-level, avoiding the unwieldy alternative o
Anni [7]

Answer:

The department by department is arranging users into security groups to set permission at a group-level.

Explanation:

Team by team is just formed group method but the team been set will work on based on the project. Once the project is getting over then the team group assigned permission has to be disabled or deleted.

 

Department by department is just good methods where each department will have a list of users and easy to assign the group.

user-by-user. is just assigning the rights of each individual user. But if the user has multiple departments login it will be good advice.

organization-by-organization. It is just assigning rights to complete users list in the organization.  

6 0
3 years ago
A collection of a set of instrument that solve a problem is called .....​
Maru [420]

Answer:

Internet

Explanation:

A collection of a set of instrument that solve a problem is called the internet.

The Internet is an enormous networking infrastructure that uses the Internet protocol suite (TCP/IP). It connects millions of computers together globally, forming a network in which computers can communicate with each other provided that they are both connected to the Internet.

The Internet contains billions of web pages and resources created by software engineers from around the world, making it a limitless place to locate information and solve peculiar problems.

3 0
3 years ago
Read 2 more answers
A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to
Katen [24]

Answer:

A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) _____local___________ printer, and Computer2 considers the printer to be a(n) _____network___________ printer.

Explanation:

Any printer installed directly to Computer 1 is a local printer.  If this printer is then shared with computers 2 and 3 in a particular networked environment, it becomes a shared printer.  For these other computers 2 and 3, the shared printer is a network printer, because it is not locally installed in each of them.  There may be some features which network computers cannot use on a shared printer, especially if the printer can scan documents.

4 0
3 years ago
Other questions:
  • There is a simple pattern for determining if a binary number is odd. What is it and why does this pattern occur
    6·2 answers
  • What is a device that connects to the system unit and is controlled by the processor in the computer called !
    15·1 answer
  • If you do not specify any criteria in a delete query, Access will delete all the records in the table. Truth or False
    11·1 answer
  • Three common risk factors for young drivers and how you plan to minimize these factors.
    13·1 answer
  • Microsoft Publisher - Assignment #1
    7·1 answer
  • Who is the prince of math?
    5·2 answers
  • Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C
    12·1 answer
  • Where can a client identify the instant deposit options for their QuickBooks Payments account?
    5·1 answer
  • Who is the father of computer?​
    14·1 answer
  • Osing Commands
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!