1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
12

Using hard disk to temporarily store data or instructions from ram is referred to as the

Computers and Technology
1 answer:
Lena [83]3 years ago
8 0
Your answer should be the memory because software will place instructions for the RAM to send to your storage hard disk for virtual memorizing to send to the CPU for processing.
You might be interested in
Host A sends two UDP segments to Server S, one to port 1234 and the other to port 2345. Host B sends one UDP segment to Server S
SOVA2 [1]

Answer:

A

Explanation:

8 0
3 years ago
Each of the following code fragments contains a number of security vulnerabilities. For each fragment, identify these security v
Trava [24]

Answer:

Check the explanation

Explanation:

a)

1) int main(int argc, char *argv){

argv has always been an array of pointer whereby each and every element points to the command line argument that is passed to the program.

int main(int argc, char *argv[]) {

2) passwords = fopen(filePath, "r");

argv[0] always holds the name of the program currently running i.e. itself

So you shouldn't even try not to open a executable file for reading. since doing this will not give error but you won't be able to read the file as it is a binary file.

it is god to always check whether the file was opened successfully or not after opening the file. If file was not opened successfully fopen will return NULL.

passwords = fopen(filePath, "r");

if(passwords == NULL)

{

printf(“\n Unable to open file”);

return -1;

}

3) execl(shellPath, "shell", NULL);

Before making a call to execl you should close the open file

close(passwords);

b)

1) char itemID[9];

After creating a char array one should always initialize the array as it may contain some garbage value.

char itemID[9] = “”;

2) scanf("%d", &unitsOrdered);

Since unitOrdered represents the quantity, it should always be non zero and non negative

c)

1) char fullName[MAX_LEN];

MAX_LEN should not be zero or negative as it used to define the size.

If ( MAX_LEN <=0 )

{

return error;

}

else

{

char fullName[MAX_LEN]

}

2) strcpy(fullName, firstName);

Before using the string functions you're expected to always make sure that the pointer that you are passing to the functions should not be NULL i.e. the pointers should always pass to certain memory location.

if (firstName && lastName)

{

strcpy(fullName, firstName);

strcat(fullName, " ");

strcat(fullName, lastName);

return fullName;

}

else

{

return error;

}

5 0
3 years ago
To find the area, Andrea tiled a rectangle and sketched her answer. Sketch Andrea's rectangle, and find the area. Show your mult
seraphim [82]

Answer:

Area = 6.25

Explanation:

Given

Length = 2.5

Width = 2.5

See attachment for rectangle

Required

Determine the area of the rectangle

Area is calculated as:

Area = Length * Width

This gives:

Area = 2.5 * 2.5

Area = 6.25

<em>The area of Andrea's sketch is 6.25</em>

8 0
3 years ago
When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
svlad2 [7]

Answer:

echo reply

Explanation:

It is a test that a user performs to confirm that remote system is up and running on the network. This is needed when basic connectivity failure problem appears. Internet Control Message Protocol  renders 2 messages for this service which are Echo Request and Echo Reply. Echo Request is a request sent to a destination device. This system acknowledges with an Echo Reply message. Echo request is generated by destination system with PING program. Ping program is used for testing basic connectivity. An echo reply is sent by target system to the requesting system acknowledging that the echo request has been received.

3 0
3 years ago
Write an algorithm
liq [111]

Answer:Pseudocode & Algorithm Example 1: Write an algorithm to determine a student's final ... Pseudocode & Algorithm Pseudocode: Input a set of 4 marks Calculate their average by ... Information system flowcharts show how data flows from source documents ... Different symbols are used to draw each type of flowchart.

Explanation:

7 0
3 years ago
Other questions:
  • Which command would you use to move a file from one location to another?
    6·2 answers
  • Mike's boss told him he needs to be more efficient. Select each suggestion that will help him become more efficient at creating
    9·1 answer
  • Do you think that feedly will help you create an effective personal online learning environment? Why or why not?
    15·1 answer
  • 1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has
    14·1 answer
  • Cheri's teacher told her to write a program that prompts the user for information. Which function should she use? input() int()
    14·1 answer
  • Explain Spreadsheet and its Basics
    13·1 answer
  • Which product is made using bacteria?<br>O A. Maple syrup<br>O B. Cork<br>O C. Latex<br>D. Yogurt​
    12·1 answer
  • Puter Science (IS)
    14·1 answer
  • 2.11 (Separating the Digits in an Integer) Write a script that inputs a five-digit integer from the user. Separate the number in
    12·1 answer
  • You can change the ____ or position of text within a document's margins.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!