Answer:
Secondary memory.
Explanation:
Unlike main memory which loses its content when electrical power to the system is turned off, secondary memory is volatile and persistent in nature. i.e it retains its content whether or not power is supplied to the computer that is holding it. As a matter of fact, they (secondary memory) are meant to store data permanently. Examples of such memory are the hard drives, floppy disks, flash drives, CDs and CDROMs.
Also, unlike the primary or main memory that can be accessed directly by the processor of the computer housing it, secondary memory are not accessed directly.
Answer:
Did the global surface temperature increase steadily from 1995 to 2013?
Did sea ice extent in polar regions reduce because of melting from 1995 to 2013?
Explanation:
Only two questions are directly related to global warnings increasing sea levels:
- Did the global surface temperature increase steadily from 1995 to 2013? Increasing temperature of the Earth's surface is actually what warming means.
- Did sea ice extent in polar regions reduce because of melting from 1995 to 2013? If the polar ice melts then the sea levels will rise.
The other three questions were about the negative effects of rising sea levels, but not what could cause them.
<u>Implication of technological literacy to a teacher training today
:</u>
- First of training has to be under technology literacy before training starts. Trainer also should have enough knowledge on technology literacy.
- Trainer can take printed materials to share the document on the topic which to be covered and circulated to trainers
- Since it given as general topic, training teacher has to cover the following topic, general on computer and purpose of computer today's life, life cycle of computer grown from old PC to laptop and tablet.
- Next topic such be covered operating system and explain about the operating system and different technology is used.
- Revolution on technology should be also covered and explained in details.
Answer: Federation
Explanation:
In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.