1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
10

There are a number of types of digital memory available, such as hard disk drive (HDD), random access memory (RAM), solid state

drives (SSD) and cache memory. Is there an advantage to having multiple standards or would it be beneficial to consumers if there was only one memory standard, such as just the various sizes of SSDs? Would having a single standard be less expensive and more convenient for consumers? If you use multiple types of memory with your devices, would you prefer they all used the same type? Why or why not?
Computers and Technology
1 answer:
elena55 [62]3 years ago
6 0

Answer and Explanation:

In my view, there is no benefit to having several types of digital storage, but it would be helpful when there is only single SSD format of different sizes, therefore it would be very convenient for an individual to select storage memory and doesn't get frustrated although several choices contribute to uncertainty about what to purchase rather than what is better for the machine. So, only a single centralized memory and the only one that is deemed perfect for your device so far.

(a)...Yeah, then it'll be easier and even more efficient for individuals to have a single standard because there'd be only that standard and then no more ambiguity, although it is quicker or lighter and would have been sufficient to send.

(b)...No, I wouldn't be using the very same piece of hardware if I were considering multiple processing categories because I would require memory interface types for various functions, so those won't all require the very same memory, however, I would like various storage of various sizes and I'm using memory interface categories effectively.

You might be interested in
You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
MA_775_DIABLO [31]
The answer is b) No

2% of 500 is 10.
$10 interest per year.

There are 12 months in a year. $2 per month
2 * 12 = 24
$24 a year is the fee. 

So, if you have a $10 interest per year, but are paying $24 per year on a fee, you are not getting ahead. 


Hope this helps you! (:
-Hamilton1757
4 0
3 years ago
Read 2 more answers
Select all the correct answers.
inysia [295]

Answer:

Buyers can source products from anywhere in the world.

Your purchases are delivered to the location you specify.

Explanation:

E-commerce refers to the process of buying and selling goods and services through the internet or the virtual world. The economic and business transaction done through this process constitutes electronic commerce or e-commerce.

Two advantages for buyers are that the <u>buyer can source the goods and products from all over the world and also get them delivered at the location specified</u>. This allows for an easy and effortless transaction and also saves the buyer's time and energy. With things available at just a touch of an electronic screen, the buyer can get products from anywhere and get them delivered at his/ her doorstep or for that matter, anywhere he/she wished it delivered, with no extra effort from his side.

Thus, the correct answers are the third and fourth options.

4 0
3 years ago
Which of the following is a file on the host computer used for temporary memory storage when a sudden surge in memory requiremen
o-na [289]

Answer:

The answer is memory buffer.

Explanation:

Which of the following is a file on the host computer used for temporary memory storage when a sudden surge in memory requirements exceeds the physical amount of memory available?

The answer is memory buffer.

A buffer, also called buffer memory, is a portion of a computer's memory that is set aside as a temporary holding place for data that is being sent to or received from an external device, such as a hard disk drive (HDD), keyboard or printer.

4 0
3 years ago
What is the full word of"VPN"?​
pantera1 [17]

Answer:

Virtual Private Network.

Explanation:

A VPN helps protect your data when accessing the internet. It usually scrambles your IP location and encrypts your data.

5 0
3 years ago
Read 2 more answers
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
Other questions:
  • What is the difference between render and draw in game programming?
    15·1 answer
  • The is a global information system logically linked together by a globally unique address space based on the Internet Protocol o
    5·1 answer
  • 1) Discuss when it is best to use indexes. ​
    6·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • Select the correct answer. Which of these is a game-centric handheld gaming console? A. IPad B. iPhone C. PSVita D. Xbox ​
    9·2 answers
  • Tech A states that modern vehicles use asbestos as the brake material. Tech B states that asbestos is no longer used in brakes.
    8·1 answer
  • How do you enter the decimal 73 into the computer?
    11·1 answer
  • Dana is moving to a new house. She has 15 boxes for books. Each box can hold up to 22 books. Dana has 375 books. How many more b
    10·2 answers
  • Why is nigeria no<br>t in the country list​
    6·2 answers
  • You need to design an online login form in which users have to type their name and password to log into an application. The pass
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!