1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
15

Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto

rage the CPU None of these
Computers and Technology
1 answer:
xxTIMURxx [149]3 years ago
3 0

Answer:

The answer is  Secondary Storage.

Explanation:

Secondary storage is a non-volatile type of memory storage device that is able to hold data for long periods of time until it is overwritten or deleted. Even when there is no power, the data will still be there. A hard drive or an SSD may be used as secondary storage. Secondary storage devices serve as an addition to the RAM and cache memory. Programs will be held into the secondary storage until it gets to a point when they are loaded into RAM for processing.

You might be interested in
Which type of user profile is stored in the C:\Users folder and is automatically created when a user logs on to the computer for
Sladkaya [172]

Answer:

a. Local user profile.

Explanation:

Local user profile is a type of user profile which is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time and it is being stored on the local hard disk of the computer.

Generally, in Microsoft windows any change made to the local user profile is peculiar to the user and the host computer on which the change is made.

Hence, local user profiles avails several users the opportunity of sharing a single computer with their respective user settings and data.

3 0
3 years ago
Suppose your parents are planning to take you
Verdich [7]

Answer:

I think the answer would be a smartphone, hope this helps! Comment if I am wrong

4 0
3 years ago
u arrive at an intersection with traffic lights that are not working because of a power outage. What do you do?
maxonik [38]
Go to o rilles or autozone
5 0
4 years ago
All of these issues are results of data integrity problems except ________.
Dvinal [7]

If there is an issue with the integrity of data the only one that will not be an issue is; The system will give users too much information.

<h3>What is Data Security?</h3>

Data Security is defined as a security service that deals with identifying any alteration to the data. This is as a result of the data getting modified by an unauthorized entity either intentionally or accidentally.

Now, data security is also called data integrity is simply the safety of data and from the options given if there is an issue with the integrity of data the only one that will not be an issue is  the system will give users too much information. because it is not a function of breach of data security.

Read more about data security at; brainly.com/question/4688296

8 0
3 years ago
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in
Gekata [30.6K]
Wi-Fi is the anwser.Hope I helped.
7 0
3 years ago
Other questions:
  • Create an old sample dictionary {0:10, 1:20} as follows to store numbers. Write a Python script to ask how many runs from user i
    11·1 answer
  • What was Pike's objective on his first expedition in 1805?​
    9·1 answer
  • The _________ lets you move the view of a web page up or down and left or right.
    13·2 answers
  • One example of a <br> is the length of a car.
    7·1 answer
  • What is an example of value created through the use of Deep Learning?​
    12·2 answers
  • Five uses of the start button
    7·1 answer
  • Topic: Video Games
    15·1 answer
  • Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is beli
    8·1 answer
  • Explain external interface bus
    7·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!