1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
6

Which storage con be usedas permanent storagea) Rom6) RAM, © main memery​

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
4 0

Answer:

ROM

Explanation:

Data in ROM does not erase itself when the computer is shut down. The data is permentely written and stored.

You might be interested in
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
14. Which commercial RDBMS product was the first to hit the market and is the biggest?
schepotkina [342]

The answer is definitely (A. SQL server) it was released back in 2010 and is huge!

Let us know if there is anything else you need to know.

Mark brainlest :)

3 0
3 years ago
What is the binding time for the following in C/C++ program. Explain. a. The location of memory of a local variable in a functio
Evgen [1.6K]

Answer:

Explained

Explanation:

Binding is the association of an object with its attributes, operations, or name  there are many different types of bindings and bindings can occur at different times .

for example:

1)language definition time binding: for example-binding * to multiplication

2)language implementation time binding: int size and operations

3)compile time binding: binding type to a variable

for instance in int x; x will be treated as an int from here forward

4)link time binding: binding function name to a specific function definition

5)load time binding: binding variable to memory location

6)run time binding: binding variable to memory location or bind a polymorphic variable to specific class type .

 binding time for the

a)6  run time binding

b)1  language definition time binding

c)2  language implementation time binding

d)5  load time binding

e)4  link time binding

f)3  compile time binding

g)3  compile time binding:

h)6 run time binding

6 0
3 years ago
which responses would you use for a computer or electronic medical record outage? (select all that apply)
kupik [55]

The responses that a person need to use for a computer or electronic medical record outage is option A: Verify computers, printers, and WOWs are plugged into red outlets.

<h3>What are the problems with electronic medical records?</h3>

In regards to  computer or electronic medical record, there are sometimes where there is found to be some outage.

Note that  based on  USF Health, some key healthcare givers and patients can be very concerned in regards to  medical privacies if they are using EHRs.

Note that some of the concerns includes the lost information as a result of a natural disaster as well as cyber hacks.

Hence, The responses that a person need to use for a computer or electronic medical record outage is option A: Verify computers, printers, and WOWs are plugged into red outlets.

Learn more about medical record from

brainly.com/question/21819443

#SPJ1

See full question below

5. Which responses would you use for a computer or electronic medical record outage? (select all that apply)

Verify computers, printers, and WOWs are plugged into red outlets.

Reset equipment, if needed, by turning on and off.

Locate downtime forms and use if directed.

Verify critical patient care equipment is functioning properly.

Refer to downtime computer and printer on unit.

Use red emergency phones.

8 0
1 year ago
Help me or I'll go insane I've 6x already I'm about to lose it!!!!
Lemur [1.5K]
Two:
<span>Hiding the complexities of hardware from the user.
Managing between the hardware's resources which include the processors, memory, data storage and I/O devices.
Handling "interrupts" generated by the I/O controllers.
<span>Sharing of I/O between many programs using the CPU.

Three:
</span></span><span>Desktops
icons
menus
windows.</span><span>

Seven:
</span><span>The convention is that ellipses following a menu item usually means that the menu item will open a dialog box with further choices, rather than immediately carrying out an action.
</span>
Eight:
Organize Your Files

Nine:
Use the save as Command
name the File

Ten:
Open the file you want to delete
Select the file you want to delete
select Delete from the file menu
Confirm the deletion

Hope this helps
5 0
3 years ago
Read 2 more answers
Other questions:
  • The command for creating a PivotTable is found in the <br> tab.
    7·1 answer
  • What command limits structural changes, such as adding, deleting, or moving sheets, that can be made in a workbook?
    13·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • How would you define media literacy?
    12·1 answer
  • Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the
    12·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • I need help NOW with my java script!! 1. What will the code below output to the console and why? const person = {
    9·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!