1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
15

RAM memory is considered volatile because this memory is erased when the computer is turned off

Computers and Technology
1 answer:
Goshia [24]3 years ago
5 0
False because ram is constantly always running
You might be interested in
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n
Jobisdone [24]

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

8 0
4 years ago
You want to verify that the Webpages you create are compliant with an accessibility standard supported by a particular governmen
alexdok [17]

Answer:

Validating the pages with an automated validation tool provided by the government.

Explanation:

If I want to verify that the web pages I developed are compliant with an accessibility standard supported by a particular government.I will validate my web pages with an automated validation tool that is provided by government.

There are automated validation tool available and those are supported by a particular government.

5 0
3 years ago
The output of a combiner is normally fed into a
ankoles [38]

The output of a combiner is normally fed into a mask filter. Check more about output below.

<h3>What is output?</h3>

Output is known to be that which is gotten from the act of making of anything or the amount of a thing that is processed.

Note that he output of a combiner is normally fed into a mask filter as it is the first point of contact.

Learn more about output  from

brainly.com/question/20727977

#SPJ2

7 0
2 years ago
Read 2 more answers
What resources can be shared over a computer network?
quester [9]

Answer:birthday

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which dialog box opens after selecting a cell in the list of prepared data, clicking the insert tab on ribbon and the clicking t
    6·1 answer
  • By default, power search will
    14·1 answer
  • An Ethernet network, all data travels across the network and between computers in which form or unit?
    12·1 answer
  • A(n) Answer display color uses the least electricity when compared to any other color.
    15·1 answer
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • Which of the following is considered a white collar crime?
    13·1 answer
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • The Federal Trade Commission FIP principle of Notice/Awareness states that
    5·1 answer
  • Spam is _____.
    8·1 answer
  • What makes a recipe for a meal an example of an algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!