1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
13

Storage that is wiped clean when power is cut off from a device is known as _____.

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
4 0
<span>Volatile. An example would be RAM.</span>
You might be interested in
If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped co
Katena32 [7]

The root cause of the error  when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.

<h3>Which device is used to transfer data from one place to another?</h3>

The device that is often used is known to be an External Hard Drives or the use of Media Devices for big Data Transfers.

Note that Copying data into an external hard drives, flash drives, or other kinds of storage devices is said to be another way that is often used in the transfer of data.

Moving specific files or backing up the full system from one computer to another is known to be very quick and easy.

Therefore, The root cause of the error  when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.

Learn more about error message from

brainly.com/question/25671653

#SPJ1

6 0
1 year ago
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
David wanted to build a Temple for God in________
Leona [35]

Answer: The answer would be Bethlehem!

4 0
3 years ago
Read 2 more answers
How desktop case or chassis designed?, material and steps?​
MariettaO [177]

They may require things such as plastic cut outs and glass depending if you want to be able to have a window to look into the pc. Some cases are 3D Printed although they have to be joined by screws at the end due to the fact that one whole print can take over a week and then it has to be well doesn't but looks better when sanded.

3 0
2 years ago
A legend in Excel is __________.
KIM [24]

Answer:

an information key that explains how information in a chart is represented by colors or patterns

Explanation:

This is the information that is used to explain the data in the graph.

4 0
4 years ago
Read 2 more answers
Other questions:
  • Tiny charts embedded in cells that show a visual trend alongside the data are called __________.
    10·1 answer
  • Which of the following are true about the PUSH instruction?
    9·1 answer
  • SOMEONE HELP PLEASE!!!!!
    6·1 answer
  • Which of the following is the key benefit is offered by the Internet channel? Group of answer choices Deeper assortments Immedia
    7·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
  • Give three reasons why Black hats hack?
    8·2 answers
  • Which of the following is NOT an example of one of the six primary ways businesses use the Internet?
    10·2 answers
  • A signal causes the operating system to stop and assess what to do next.( Identify the name of this signal.)​
    5·1 answer
  • All languages require the code which is simply a word that means _____.
    9·1 answer
  • Carmen has met new people online that she enjoys talking to. One of these people has asked her to meet at the park in person and
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!