1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
3 years ago
15

Please answer fast..​

Computers and Technology
1 answer:
wlad13 [49]3 years ago
6 0

Answer:

a. False.

b. True.

c. False.

d. False.

Explanation:

a. False: Data stored in RAM are called firmware. It's the data stored in read only memory (ROM) are called firmware.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

b. True: a register is a temporary storage device within the central processing unit (CPU) of a computer system. Thus, it is designed to quickly accept, store and transfer data or instructions being used on a computer system.

c. False: the result obtained after data processing is given by input devices. Any result obtained after data processing is given by output devices such as speakers, monitor, projector, etc.. Input devices such as keyboard, mouse, scanner, etc., are used for entering the data into a system.

d. False: E-shopping allows us to make deposits, withdrawal and pay bills with the click of a mouse.

E-shopping can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, E-shopping is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

You might be interested in
Create a function generateString(char, val) that returns a string with val number of char characters concatenated together. For
WARRIOR [948]

I have write a very simple code for you in python and i hope it will help you a lot.


def generateString(char, val):

   print(char * val)

Explanation:

This is how you can create your function in python and this function will give you the desired output.


How to Call a function:

generateString('a',12)

this is how you can call the function to get output.

I hope you get the idea.



5 0
4 years ago
Read 2 more answers
A large company has a LAN. The manager of the company wants to change it to a WAN
garik1379 [7]

Answer:

\bold{\huge{\fbox{\color{Green}{☑Verified\:Answer}}}}

Explanation:

Router. A router is a networking device typically used to interconnect LANs to form a wide area network (WAN) and as such is referred to as a WAN device. IP routers use IP addresses to determine where to forward packets. An IP address is a numeric label assigned to each connected network device.

Fям:- \small\tt{\blue{(brainly.in)}}

6 0
3 years ago
How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
blondinia [14]

Answer:

115200000 bits

Explanation:

Given Data:

Total Time = 3 minute = 3 x 60 sec = 180 sec

Sampling rate = 40,000 bits / sample

Each sample contain bits = 16 bits /sample

Total bits of song = ?

Solution

Total bits of song = Total Time x Sampling rate x Each sample contain bits

                             = 180 sec x 40,000 bits / sec x 16 bits /sample

                             = 115200000 bits

                             =  115200000/8 bits

                             = 14400000 bytes

                             = 144 MB

There are total samples in one second are 40000. Total time of the song is 180 seconds and one sample contains 16 bits. so the total bits in the song are 144 MB.

5 0
3 years ago
Antiglare screens are sometimes called ____.
yaroslaw [1]
Simply a glare screen, because it clearly states what it protects one against, I guess.
8 0
3 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Other questions:
  • Websites that are designed to adapt gracefully to any screen size use a technique called
    5·1 answer
  • What is the protocol that is used between a web browser and web server at the transportation layer?
    13·1 answer
  • Which of the following describes a BYOD?
    15·1 answer
  • What is a good way to minimize technical problems with your computer
    10·1 answer
  • How do headphones work? (From pc)
    8·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • The way that text and images are arranged on a slide is called _________. A. Layout B. Background C. Style D. Charting
    10·2 answers
  • What is the purpose of the operating system's processor management function?
    14·1 answer
  • What are the three uses of a screw?​
    13·2 answers
  • Acquiring new knowledge and skills at every stage of life:
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!