Answer:
RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.22-Aug-2019
Answer: True
Explanation: Ushahidi is technology that is responsible for the dividing the work and gaining the outcomes from the public accounting ,publishing, social activities for the instantly making the information available towards the world.
It is a non-profit organization that is responsible for the distribution of any products to clients for the crisis mapping mechanism and gaining the feedback reports.
Answer:
Most HTML tags are fixed
Explanation:
There are various kind of technology one can use for designing web application. A web designer should know HTML, CSS and other basic building block of web development.
HTML meaning hypertext markup language is used to define the basic structure of a web page . HTML has tags which are used to declare the contents on the web page. The tags includes anchor(<a>), paragraph tag(<p>),header tag(<h1>).
CSS which is known as Cascading style sheet describes the presentation of the web pages.
Other tags in HTML includes <img>, <link>, <ul> etc and generally this tags are HTML tags which are fixed for a particular kind of job . For example you can't use an image tag <img> to enclose video instead you use a video tag <video> tag. The header tag <h1> cannot be represented like a paragrapgh tag<p> on the web page. The both of them serve specific purpose and are fixed.
They instance, "user trial engineer" may refer to a human factors professional who specialists in user trails. Reliability works stress and training as these may relate to human-system and human-computer interaction design.
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.