1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
10

The auxiliary device used to store large volume of data and program for future is called​

Computers and Technology
1 answer:
3241004551 [841]3 years ago
4 0

Answer:

Auxiliary memory units are among computer peripheral equipment. They trade slower access rates for greater storage capacity and data stability. Auxiliary memory holds programs and data for future use, and, because it is nonvolatile (like ROM), it is used to store inactive programs and to archive data.

Explanation:

hope the answer was helpful...

You might be interested in
Given that k refers to a non-negative int value and that t has been defined and refers to a tuple with at least k+1 elements, wr
Rus_ich [418]

Answer:

The expression is "t[k]".

Explanation:

In the question, it is defined that variable k refers to positive integer and variable t refers to a tuple that holds at least k+1 element. The expression for defining the kth element of t is t[k].

  • Where variable t is tuple that collects a sequence of immutable (in-built) Python objects. To define tuple we use the parentheses.
  • The main purpose to use tuple in this question is that it cannot be changed.  

5 0
3 years ago
Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
Fynjy0 [20]

Answer:

Java provide all the ADTs you need,therefore you do not need to create any newones.

This statement is not true.

Explanation:

ADTs are those data types which we use but we didn't know their inner working that is how it is working what is happening inside.It is commonly used for Data Structures for example:- In stack we use push and pop operations to insert and to delete element from a stack respectively but we didn't know how it is happening inside.How the stack is implemented and etc.Java provides most of the ADT's but not all.

5 0
3 years ago
A university wants to schedule the classrooms for final exams. The attributes are given below:
iVinArrow [24]

Answer:

See explaination

Explanation:

Clearly the entities are as follows:-

Course

Section

Room

Test

The relationship among entities are as follows:-

Course has Section

Test is conducted for Course

Test is conducted in Section

Test is conducted in Room

Attributes of each entities are as follows:-

Course (CourseID, Name, Department)

Section (SectionID, Enrollment)

Room (RoomNumber, Capacity, Building)

Test (Time)

Section is a week entity as, there may be same sections for different courses, therefore section uses the primary key of course entity as foreign key.

Also entity Test is dependent upon the entities Room,Section and Course, therefore primary keys of these entities will be used as foreign key in the Test entity.

Check attachment for the ER diagram

5 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
How do you insert text into a presentation?
ElenaW [278]

Answer:

Its most likely the last one

Explanation:

But like, what kind of quesiton is this?

7 0
3 years ago
Read 2 more answers
Other questions:
  • Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
    12·1 answer
  • Why was the term personal computer created?
    5·1 answer
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a
    12·1 answer
  • How to change screen resolution in windows 10?
    5·1 answer
  • How prevalent is licensing for software engineers in the United States
    5·1 answer
  • Lines s, t, and u are perpendicular bisectors of the sides FGH and meet at J. If JG=2x+2, JH=2y-4, JF=8 and HI=3z-3, find x, y,
    15·2 answers
  • Directions and Analysis
    15·1 answer
  • Drag each tile to the correct box.
    9·2 answers
  • What action should you take if you become aware that sensitive compartmented information has been compromised
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!