1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
10

There are a number of types of digital memory available, such as hard disk drive (HDD), random access memory (RAM), solid state

drives (SSD) and cache memory. Is there an advantage to having multiple standards or would it be beneficial to consumers if there was only one memory standard, such as just the various sizes of SSDs? Would having a single standard be less expensive and more convenient for consumers? If you use multiple types of memory with your devices, would you prefer they all used the same type? Why or why not?
Computers and Technology
1 answer:
elena55 [62]3 years ago
6 0

Answer and Explanation:

In my view, there is no benefit to having several types of digital storage, but it would be helpful when there is only single SSD format of different sizes, therefore it would be very convenient for an individual to select storage memory and doesn't get frustrated although several choices contribute to uncertainty about what to purchase rather than what is better for the machine. So, only a single centralized memory and the only one that is deemed perfect for your device so far.

(a)...Yeah, then it'll be easier and even more efficient for individuals to have a single standard because there'd be only that standard and then no more ambiguity, although it is quicker or lighter and would have been sufficient to send.

(b)...No, I wouldn't be using the very same piece of hardware if I were considering multiple processing categories because I would require memory interface types for various functions, so those won't all require the very same memory, however, I would like various storage of various sizes and I'm using memory interface categories effectively.

You might be interested in
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
What are the different between Facebook and LinkedIn
DIA [1.3K]
Face you can talk to friends post picture's and see pictures of friends i am not really sure what is linkedln
7 0
3 years ago
Read 2 more answers
How does a computer work
ivann1987 [24]

Answer:

computer works on electricity

Explanation:

6 0
3 years ago
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
3 years ago
Heya!!<br><br>•DEFINE DATA SCIENCE??<br>(∩_∩)<br><br>#kavya#<br>​
anastassius [24]

Answer:

Explanation:

Data science defined

Data science encompasses preparing data for analysis, including cleansing, aggregating, and manipulating the data to perform advanced data analysis. Analytic applications and data scientists can then review the results to uncover patterns and enable business leaders to draw informed insights.

5 0
2 years ago
Other questions:
  • In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
    14·1 answer
  • Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro
    11·1 answer
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • How do you change between worksheets inside an excel workbook?
    13·2 answers
  • The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
    13·1 answer
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • 4.11 lesson practice quizz need help on 2 and 3
    5·1 answer
  • To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
    12·1 answer
  • Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
    11·2 answers
  • What does syntax error mean :-;<br>explain briefly.<br><br>thankyou!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!