1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
2 years ago
8

Diffrence betwwen RAM and ROM​

Computers and Technology
1 answer:
cestrela7 [59]2 years ago
5 0
Answer : RAM is used to store computer programs and data that CPU needs in real time. ROM have prerecorded data and it is used to boot computer.
You might be interested in
Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
pentagon [3]

Answer:

E. Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A

Explanation:

The cisco ios is the operating system of any cisci network device. It is a command line interface used to configure these cisco devices.

The privilege user command "show running-config" in the command line interface is used to show the current configuration on the RAM of the router.

There are two ways to protect the router's console line with a password, with enable secret and enble password. The "enable secret" is a slightly encrypted password but the "enable password" has no encryption. These password methods are used to secure any channel to the router.

The "service password-encryption" command is used to encrypt all the passwords in the current configuration, to prevent attackers or unauthorized users from getting to the router.

7 0
3 years ago
"is it important to have a firewall on a home network
Sergio039 [100]
Yes, you should have a firewall on your home network prevent hackers from getting in your network and causing damage to your devices or files. You should be able to put up a firewall with your Windows computer on the home menu>control panel>Firewall and that should work.
5 0
3 years ago
In which of the following situations should you expect to provide your Social Security number?
sveta [45]
Hey there!

Some situations you'd need to provide your SSN include when applying for insurance through an insurance company, when applying for a loan or a credit card (or any other company that you're sending a credit application to), banks, investment advisors, and cash transactions over $10,000, such as when buying a car. Also, if you are going to college with financial aid, colleges will collect your SSN. If any other business requests your SSN, they are legally allowed to, however, it's optional. It's also optional when applying for a job at a company, but might affect your chances at getting the job depending on the employer who may want to get credit statistics on their potential employees. 

Hope this helped you out! :-)
7 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    8·2 answers
  • Differentiate between third and fourth generation of computer​
    6·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • What is the output of the following program?
    10·1 answer
  • What is a single-user computer?
    8·1 answer
  • I need help with writing the code in Python that draws an arrow pointing to the right.
    15·1 answer
  • A recursive method that computes the number of groups of k out of n things has the precondition that ______. n is a positive num
    12·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth
    5·1 answer
  • Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!