1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
11

The basic difference between RAM and ROM memory is: Question 5 options: A) RAM is nonvolatile while ROM is volatile. B) RAM is r

ead/write while ROM Is read only. C) ROM is used to store programs and data, while RAM is not. D) ROM is typically specified when you buy a computer; RAM is not.
Computers and Technology
1 answer:
schepotkina [342]3 years ago
6 0

The basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.

Explanation:

  • A ROM, non-volatile memory, does not use to store data, but RAM is volatile and requires power to store data.
  • ROM is not given usually as a specification, but RAM is typically specified when buying a computer.
  • We can write data only once in ROM. However, once it is written, we can read it any number of times. RAM is the main memory in a computer, and read from and write to it much faster than other storage types. RAM is used to store files in use on the computer.

Hence the basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.

You might be interested in
Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
Nimfa-mama [501]

Answer:

1. URL (Universal Resource Locator)

2. DNS (Domain Name System)

3. Network

4. Packets

5. The Internet Engineering Task Force (IETF)

6. Bit

7. HTTP (Hypertext Transfer Protocol)

8. Protocol

Explanation:

1. "URL is the address of a World Wide Web page."

2. "DNS: The service that translates URLs to IP addresses. IP Address: A number assigned to any item that is connected to the Internet."

3. "A network is defined as a group of two or more computer systems linked together."

4. "In Information technology, a packet is collection of data that can be used by computers which need to communicate with each other, usually as part of a network."

5. "The Internet Engineering Task Force is an open standards organization, which develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite."

6. "A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1"

7. "Hypertext Transfer Protocol provides a network protocol standard that web browsers and servers use to communicate."

8. "A network protocol defines rules and conventions for communication between network devices. Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into sent and received messages."

Hope this helps! <3

4 0
4 years ago
I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
gogolik [260]

I'm better then u in brawhlla

5 0
3 years ago
8.2 code practice edhesive
Helga [31]

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

3 0
3 years ago
Computer security is the use of ____ security techniques to protect data stored on computers.a. physicalb. portc. ​logicald. ​en
Arte-miy333 [17]

Answer:

anti virus

Explanation:

3 0
4 years ago
What are the external parts of a computer system and which are output devices and which are input devices
cestrela7 [59]
I'd question the wording, However:

Monitor, Output device.
Keyboard, Input device.
Mouse, Input device.
Speakers Output Device.
Microphone, Input device.
Printer, Output device.
Scanner, input device.

Devices do not have to explicitly be one or the other e.g. a printer with a scanner, or headphones with a microphone.  
4 0
4 years ago
Other questions:
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • Suppose that you are developing an application in which you want to connect to a server to upload some data. You create a socket
    6·1 answer
  • You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
    5·1 answer
  • If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the
    9·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
    5·2 answers
  • Who are the people responsible for maintaining and controlling computer networks within an organization?
    10·1 answer
  • When Jimmy Fallon is outside the White House, his persona is mostly O A. humble O B. stern O c. gloomy O D. wild​
    9·1 answer
  • Which of the following is an input device on a toaster?
    10·2 answers
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!