1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
8

Diffrence betwwen RAM and ROM​

Computers and Technology
1 answer:
cestrela7 [59]3 years ago
5 0
Answer : RAM is used to store computer programs and data that CPU needs in real time. ROM have prerecorded data and it is used to boot computer.
You might be interested in
No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have vi
My name is Ann [436]

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.
4 0
3 years ago
Pls help me awnser this I will give points
joja [24]

Answer:

first one is "int" second one is "string" and third one should be "float"

Explanation:

not sure if the first one is right but try this.

6 0
3 years ago
Disadvatage of using a computer when you don't have knowledge about it​
shtirl [24]

If you mean you have no knowledge of the subject you're supposed to be researching, than that's the disadvantage, because you will have many,many different pages for what the search engines can relate what you're searching on to what it hints will help.

Disadvantages of using a computer when you don't know how to use a computer.

You don't know how to use a computer.

7 0
4 years ago
What is the music form for the song "Sunflower?
Leni [432]

Answer:

spiderman i believe. by post malone

Explanation:

4 0
3 years ago
Read 2 more answers
5 similarities between the C and C ++ language​
mel-nik [20]

Answer:

Check explanation

Explanation:

Well, for one thing, C++ is a superset of C. This means:

  • They both have similar syntax
  • Similar code structure
  • Similar compilation

Another similarity is that pretty much all of C's keywords and operators are used in C++ with the same use.

They both also use the semicolon (;) as the statement terminator.

There you go. 5 similarities between C and C++.

3 0
3 years ago
Other questions:
  • When creating an electronic slide presentation, Eliza should ensure that her presentation contains
    6·1 answer
  • Which us electronic company was the pioneer in home video game consoles?
    13·1 answer
  • The narrative structure of the popular movies can be broken down into
    15·1 answer
  • Sql is an example of a ________ category programming language. 4gl 3gl 5gl 2gl
    15·1 answer
  • Which version of Windows was considered an operating environment rather than an operating system? Windows 1.0 Windows 3.0 Window
    9·1 answer
  • 9. Ways in which a person or object is influenced by the surrounding environment​
    8·1 answer
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • The site is not allowing me to purchase the subscription. Please help?
    12·1 answer
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • List two major problems that could be addressed by futuring.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!