1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
3 years ago
5

What is the full form of RAM. ​

Computers and Technology
2 answers:
grigory [225]3 years ago
7 0

Random Access Memory

Klio2033 [76]3 years ago
3 0

ANSWER

RAM stands for "random access memory "

it is a word related to computer and technology.

You might be interested in
An OU structure in your domain has one OU per department, and all the computer and user accounts are in their respective OUs. Yo
tamaranim1 [39]

Answer:

Block Inheritance.

Explanation:

Block Inheritance:-It is used to block the inheritance of the GPOs.If in the setting Block inheritance is enabled the inheritance of GPOs will get blocked.This is the way to block GPOs inheritance as they can be inherited by default .So the for the case given Block Inheritance is best suited.

6 0
3 years ago
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
erastova [34]

If Seneca has not done anything since the conditional formatting she can undo what her last action was. This is done by either pressing control+Z or by clicking on the undo icon.

If other actions have been done, there are a few more steps that need to be taken in order to clear the formatting. They are:

1. Select the cell or cells whose formatting you want to delete.

2. Display the Home tab of the ribbon.

3. In the Editing group, click Clear | Clear Formats.

8 0
3 years ago
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
4 years ago
Your S3 backed website is consistently receiving over 400 read requests per second and is steadily rising. What can you do to ac
horrorfan [7]

Answer:

Configure the CloudFront CDN and the use of S3 bucket as the origin

Explanation:

The S3 backed site receives more than 400 reader queries every second regularly and is increasing gradually. Customize the CloudFront CDN and then use the S3 bucket as the source to obtain the highest efficiency as web traffic continued to increase.

So, that's why the following answer is correct according to the given scenario.

3 0
3 years ago
Other questions:
  • What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
    11·1 answer
  • To find the largest number in a list of numbers, use the _____.
    8·1 answer
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • The next four octal numbers after 36 is:________.
    10·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemical
    6·2 answers
  • Which part of the Word application window should the user go to for the following activities?
    14·1 answer
  • DO NOT JOIN ANY Z O O M MEETINGS FROM THIS PERSON! IS A TRAP Please help me get them banned!!!!!
    12·2 answers
  • When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for di
    6·2 answers
  • CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!