1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
3 years ago
5

What is the full form of RAM. ​

Computers and Technology
2 answers:
grigory [225]3 years ago
7 0

Random Access Memory

Klio2033 [76]3 years ago
3 0

ANSWER

RAM stands for "random access memory "

it is a word related to computer and technology.

You might be interested in
Why should computers have a file structure?
UkoKoshka [18]
I am guessing "A" because you can store code anywhere and file structure does not prevent viruses.

hope this helped
 <span />
4 0
3 years ago
Read 2 more answers
Which of the following is the correct order of laws (from local to state to federal)
professor190 [17]

Answer:

That, Federal law > Constitutional Law > State law > Local ordinances

Explanation:

4 0
3 years ago
When working in excel online, which of the following is considered a conditional formula?
Alika [10]
B. Because conditional statements have an IF before stating the condition
8 0
4 years ago
Read 2 more answers
What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
Tamiku [17]

Answer:

Option (b) Integrity

Explanation:

  • Data Integrity refers to the data which is not modified over the process, system.
  • Data Integrity here refers to which is not corrupted over the system in any way.
  • Throughout the life cycle of the process, system the data is intact and can be trusted for the future use.So, option (b) Integrity is the correct option.
  • Option (a) Confidentiality means the data that is kept secret, private but that doesn't mean it is not modified. So, option (a) confidentiality is wrong option.
  • Option (c) Authentication means the user is authenticated to use the data. It means the user has access to the data or not.So, option (c) is wrong option.
  • Option (d) Auditing means to examine, inspect a thing to find it fit for a purpose. Here, data auditing means verifying, inspecting,assessing the quality of data for a process.So, option (d) is wrong option.
3 0
3 years ago
Which of these sedimentary rocks is made of the largest particles?
Marta_Voda [28]
Your answer is <span>A.conglomerate.

Hope this helps :)</span>
6 0
3 years ago
Other questions:
  • When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
    15·1 answer
  • Select the correct answer.
    15·1 answer
  • Which is not an element of photography? a Cropping b Height c Directional Lighting d Framing
    11·1 answer
  • Identify the primary responsibilities associated with each of the following web design roles: content writer/editor, artist/grap
    13·1 answer
  • Let’s say you’re publishing a message with the Hootsuite Composer. The message contains a link to a landing page, and you want t
    9·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • What important feature of an email gives you a clue about what the sender wants to tell you?
    12·2 answers
  • Chantelle wants to change the color scheme for her company's web app, and she needs to get the logos updated. What kind of devel
    8·1 answer
  • if we intend to include a servo motor as an actuator, what feature should we include when selecting a microcontroller?
    7·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!