1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
poizon [28]
3 years ago
12

How is primary storage different from secondary storage? Select the TWO correct statements.

Computers and Technology
1 answer:
Zina [86]3 years ago
7 0
Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.
You might be interested in
Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
Alex73 [517]
The mathematical operations/symbol/formulae can be inserted into MS powerpoint using equation editor. Just follow these steps:
1)click on the Insert
2) Select Object from the list
3) Select Equation Editor from the list and the dialog box of equation editor will open up. Now, write, edit your equation in this box. When you return back to powerpoint slide, the equation will come on the current slide, you are working on.
4 0
4 years ago
Read 2 more answers
A technician wants to create a new partition on a new additional hard drive. what tool should be used?
Vitek1552 [10]
A Disk Defragmenter should be used
7 0
3 years ago
12) The Windows utility returns your computer to the state it was in when it came from the factory. Erase Refresh Reset Backup N
Ludmilka [50]

Answer:

Reset

Explanation:

3 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
cupoosta [38]

Answer:

a. Leveling          

Explanation:

  • Leveling is also called decomposing.
  • It is a method to depict more detail in lower-level Data Flow Diagrams
  • It is the technique to expand or decompose DFDs into more details or levels to extract more information and identify all functional primitives until no further detail is required.
  • An information system can be comprised of multiple processes. Leveling partitions each process into sub-processes which identifies more details about the process with each level.
  • 0-level DFD: it starts with context diagram which depicts the whole system as a single process e.g. Grading system.
  • 1-level DFD: the context diagram is decomposed in this level. This means a single process is expanded into multiple processes which extracts more details about a process of a system.
  • 2- level DFD: this level decomposes the the process of level 1 going into further details.
  • This decomposition and expansion continues until no further details are required and all functional primitives are identified.
8 0
4 years ago
Other questions:
  • Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
    7·1 answer
  • How to change your phone number t mobile?
    5·1 answer
  • Suppose you have a 12-hour clock on a very fancy chair (noon is 12 PM and midnight is 12 AM). Write a C++ program that reads in
    7·1 answer
  • In Microsoft Access, what happens when you save a query once and run it but then add more to the query? What will happen? a)erro
    12·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • What typed of google group is best-suited for an online study group?
    7·1 answer
  • The meaning of belt drives
    10·1 answer
  • You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
    9·1 answer
  • If a base class pointer, p, points to a derived class instance, and both base and derived classes have a method void doIt() whic
    14·1 answer
  • How did Avery and Garth most likely create their
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!