1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
6

PLZ PLZ PLZ HELP WILL MARK BRAINLIST What are the properties of RAM (Memory, Random Access Memory)?

Computers and Technology
1 answer:
JulsSmile [24]3 years ago
3 0

High speed, low storage

You might be interested in
Anybody got a quisten
Fiesta28 [93]

Answer:

no why?

Explanation:

8 0
3 years ago
True or False
sineoko [7]

Answer:

VPNs encrypt your traffic while proxy servers don't.

Explanation:

8 0
3 years ago
Which media device uses the characteristic continuous?
notka56 [123]
The media device that uses characteristics continuous is the Screen.
In Continous characteristic 
is where there is timing relationship between source and destination.
4 0
3 years ago
Which is true about POP3 and IMAP for incoming email?
Novay_Z [31]

Answer:

Both keep email on an email server by default

Explanation:

IMAP synchronises emails, while POP3 downloads them for offline use.

7 0
3 years ago
Please Help
andrew-mc [135]

Answer:

A, C, and E

Explanation:

B and D have nothing to really do with the software. You can copy files by using software, you can delete files, and it lets you manage your shared folders. You cant really view events by using software and you cant find out more stuff about security events from it. Hope this helps. :) <3

5 0
3 years ago
Read 2 more answers
Other questions:
  • The central device on a network that provides a common connection point for nodes on that network is called the
    8·1 answer
  • In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
    10·1 answer
  • What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
    15·1 answer
  • What vi command do you use to insert the a file named "file2.txt" to the end of your current file?
    12·1 answer
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • How and why do engineers use models?
    15·1 answer
  • Anyone understand coding? Please Help! Thank you! :)
    8·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • What is the current situation in farming​
    13·2 answers
  • Which of the following is true about main and secondary memory?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!