1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
7

Random Access Memory is tempory computer memory that stores works in progress

Computers and Technology
1 answer:
tresset_1 [31]3 years ago
3 0
Is that a question?
Also, it's spelled temporary
You might be interested in
A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an a
ser-zykov [4K]
<span>The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.
</span>
4 0
4 years ago
What makes this web page look different from a web page that is not adapted for mobile
Charra [1.4K]
If you attach a photo, that might help
4 0
3 years ago
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
Explain how you can compare the size of product to the size of a factor when multiplying fractions without actually doing the mu
777dan777 [17]
You can multiple or dived
4 0
4 years ago
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Other questions:
  • What is a valence orbit?
    13·2 answers
  • For some brand-name computers, the hard drive contains a partition that can be used to reinstall windows. what is the name for t
    6·1 answer
  • What kind of voltage do solar cells generate? Solar cells produce ______ voltage which is not usable by most household appliance
    15·1 answer
  • Match the graph with the best description of the relationship it shows.
    15·1 answer
  • Molly, an end-user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
    5·2 answers
  • cellPhoneBill(m,tx)Write the function cellPhoneBill()that takes two int m and txas input and returns a float.The function takes
    11·1 answer
  • Describe one practical application of total internal reflection. ​
    14·1 answer
  • Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto
    14·1 answer
  • This code --&gt; plt.plot(x,y) is used to draw :
    8·1 answer
  • Which of the following could be part of an algorithm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!