1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
6

Which storage con be usedas permanent storagea) Rom6) RAM, © main memery​

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
4 0

Answer:

ROM

Explanation:

Data in ROM does not erase itself when the computer is shut down. The data is permentely written and stored.

You might be interested in
write a program which prompts the user for a celsius temperature, convert the temperature to fahrenheit, and print out the conve
JulsSmile [24]

print("——OR——") Input ("Temperature value in degree Celsius:"), celsius 2 = float) Celsius 2 = (Fahrenheit 2 * 9/5) + 32; print the result.

The user's input is taken. Enter the temperature in celsius by typing it into the input box. Fahrenheit is equivalent to (celsius multiplied by 1.8) + 32 print(str(celsius)+ "A degree in Celsius is equal to a " + str(fahrenheit)+ " degree in Fahrenheit. The change from C to F is therefore 100/180, or 5/9. It is 180/100 or 9/5 from F to C. As a result, the conversion yields °F = °C (9/5) + 32. As a result, the equation for changing from the Celsius to Fahrenheit scale becomes °F = °C (9/5) + 32. To convert from degrees Fahrenheit to degrees Celsius, do the inverse calculation: subtract 30 from the degrees Fahrenheit reading, then multiply the result by two to obtain the degrees Celsius reading.

Learn more about conversion here-

brainly.com/question/13163755

#SPJ4

6 0
1 year ago
Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
Lady bird [3.3K]

Its

Processes the data on the computer .

5 0
3 years ago
Read 2 more answers
Thinking about the career cluster, "Information Technology", which of these careers would typically NOT be included? (Choose thr
Dvinal [7]
I am guessing, my guess would be scientific research, managing entertainment, and video game designer
3 0
3 years ago
Read 2 more answers
Which is an aspect of structural level design?
natita [175]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

          "structural level design"

Structural engineer is a sub discipline of civil engineer are strained to design the bones and muscles that create the form and shape of man made structures.Structural engineer needs to understand and calculate the stability,strength and rigidity and earthquake of built structure of building and non building structures.The structural of other design are integrated with those of other designers such are architecture and building services engineer and often supervise the construction of projects by contractors on site.They can also be involved in the design of machinery,medical equipment,and vehicle where structural integrity affects functioning and safety.

Structural engineering theory is based upon applied physical law and empirical knowledge of the structural performance of differents materials and geometrics.Structural engineer engineer are responsible for making creative and efficient use of funds,structural elements and materials to achieve these goals.

7 0
3 years ago
Full Form of CPU AND RAM ?
sweet [91]

Answer:

IN COMPUTER TERMS:

CPU is centrsl processing unit

RAM is random access memory

7 0
3 years ago
Read 2 more answers
Other questions:
  • The superclass Calculator contains: a protected double instance variable, accumulator, that contains the current value of the ca
    5·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • you are the manager of a virtual team that is working on a project. You uploaded a Word document to an OneDrive account that you
    9·1 answer
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
    9·1 answer
  • Suppose you are on a desert island and possess exactly 20 coconuts your neighbor Friday is a fisherman and he is willing to trad
    14·1 answer
  • Many instruction sets contain the instruction NOOP, meaning no operation, which has no effect on the processor state other than
    14·1 answer
  • What are the raw materials for the process of photosynthesis​
    6·2 answers
  • What is the main purpose of a web crawling program
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!