1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
3 years ago
12

What temporarily holds programs and date while the computer is on and allows the computer to access that information randomly?

Computers and Technology
1 answer:
xenn [34]3 years ago
5 0
RAM- random access memory
You might be interested in
For the question below, refer to the following recursive factorial method.
Mashcka [7]

Answer:

(d) 6

Explanation:

When we call factorial(3) first it will check if it greater than 1 since it is greater then return 3*factorial(2) will be called on factorial(2) it will again check that 2>1 since it is greater then return 2*factorial(1) will be called.In factorial(1) we have is not greater than 1 so it will return 1.return 2*factorial(1) will return 2 and 2 that is returned by factorial(2) will be multiplied with 3.So it will return 6.

8 0
4 years ago
¿como influye la tecnologia en su vida cotidiana?
ANEK [815]

Answer:

La tecnología afecta la forma en que hablamos, aprendemos y pensamos. También nos hemos vuelto dependientes de la tecnología.

Explanation:

3 0
3 years ago
Eric walks 7 km East in 2 hours and then 2.5 km West in 1 hour.
Sidana [21]
Ok what is the question this is just a statement on what it is eric did.
7 0
3 years ago
There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a
spayn [35]

Answer:

The answer is True

Explanation:

Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.

When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.

6 0
3 years ago
What did you predict will happen? Check all that apply. The lioness will attack Thisbe. Thisbe will stay hidden in the cave to a
sesenic [268]

Hi,


Everything applies. It is impossible to predict based on the current data. All scenarios are possible with equal possibility.


Hope this helps.

r3t40

5 0
4 years ago
Read 2 more answers
Other questions:
  • Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
    10·1 answer
  • Which phrase describes this image most precisely?
    10·1 answer
  • An internet service provider has three different subscription packages for its customers.  Package A: For $9.95 per month 10 ho
    10·1 answer
  • Why is it important to explore an Integrated
    13·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • Bcr is an out put device true or false​
    13·2 answers
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • A retailer is able to track which products draw the most attention from its customers through the use of 5G-enabled motion senso
    8·1 answer
  • Which popular tool is used in agile software development TCS?
    10·1 answer
  • Briefly describe the function of options in a linux command and give an example of a useful option.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!