1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
7

Distinguish between secondary storage device and primary storage device

Computers and Technology
1 answer:
Ede4ka [16]3 years ago
3 0

Answer:

Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.

You might be interested in
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
zalisa [80]

Answer:

router.

Explanation:

Router is the main connection for a house network to the Internet, the firewall function is combined to the router. Every house network must have a firewall to protect their privacy.

The router provides the hardware firewall while the windows provides the software firewall.So the answer to this question is router.

5 0
3 years ago
**PLEASE HELP**
ruslelena [56]
Normally, you might expect that anything related to Sodium and Chlorine is insanely dangerous and shares properties of both(B), but since the two are making a compound, that is not true. Compounds almost never share the properties of the elements they are made from. So your answer is D.
8 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exc
Illusion [34]

Answer:

B. Enable-PSRemoting.

Explanation:

Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.

The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".

4 0
3 years ago
What are the uses of the tracrt and ping commands and what information is provided by each.
ikadub [295]

Answer:

The ping command is used to test the ability of a source computer to reach a specified destination computer. This command is used to verify if the sender computer can communicate with another computer or network device in the network.

The tracert command is used to show the details about the path sending a packet from the computer to whatever destination you specify.

6 0
3 years ago
Other questions:
  • After earning a learners license what test must be successfully passed to earn an operators license in Florida
    14·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • What is the primary limitation of free versions of antivirus applications
    14·1 answer
  • How do solar system and galaxies differ?
    9·1 answer
  • Let L be any r.e. language. We know that there is an unrestricted grammar for L. Show that L can be generated by an unrestricted
    10·1 answer
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • A license plate consists of 2 letters followed by 1 digit. How many license plates are possible if the first letter can be any l
    13·1 answer
  • Linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and trainin
    7·1 answer
  • Write code which takes a user input of a String and an integer. The code should print each letter of the String the number of ti
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!