1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
3 years ago
15

Please answer fast..​

Computers and Technology
1 answer:
wlad13 [49]3 years ago
6 0

Answer:

a. False.

b. True.

c. False.

d. False.

Explanation:

a. False: Data stored in RAM are called firmware. It's the data stored in read only memory (ROM) are called firmware.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

b. True: a register is a temporary storage device within the central processing unit (CPU) of a computer system. Thus, it is designed to quickly accept, store and transfer data or instructions being used on a computer system.

c. False: the result obtained after data processing is given by input devices. Any result obtained after data processing is given by output devices such as speakers, monitor, projector, etc.. Input devices such as keyboard, mouse, scanner, etc., are used for entering the data into a system.

d. False: E-shopping allows us to make deposits, withdrawal and pay bills with the click of a mouse.

E-shopping can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, E-shopping is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

You might be interested in
True or False: In Google Cloud IAM: if a policy applied at the project level gives you Owner permissions, your access to an indi
vekshin1

Answer:

The following statement is False.

Explanation:

When any user or person using IAM platform of the Google Cloud that give permission to the user for the particular granular access. It provides user control by setting IAM policies of what access to which services.

That's why it not restricted to view if the user applies for the restrictive rules to that resources.

8 0
3 years ago
The Circle of Growth
larisa86 [58]

Answer:

B

Explanation:

it shows you your weaknesses so you can work on them so you can find your way to success

5 0
3 years ago
A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
drek231 [11]

Answer:

<u>Sock puppet</u>

Explanation:

A sock puppet, a reference to a puppet created by placing a sock over one's hand, is a misleading or fake online identity created to promote a particular point of view, often in praise of a firm, organization, product, or individual; to manipulate public opinion or to argue, bully or review products. Regardless of the purpose it was created for, sock puppets are rarely welcome in online communities and forums.

4 0
3 years ago
97. How many bits is a ki obyte?<br> a. 1000<br> b. 1024<br> c. 8192<br> d. 8124<br> 5
Basile [38]

Answer:

b

1024

is the correct answer

6 0
3 years ago
Read 2 more answers
A serial schedule:
Lina20 [59]

Answer:

B)

Explanation:

Is alwayd sorted sequentially in aceding order by transaction ID

6 0
3 years ago
Other questions:
  • How can we get the number of records or rows in a table using MySQL? *
    8·1 answer
  • The numbering system we commonly use is called the decimal numbering system because it uses ________ symbols to represent all po
    5·1 answer
  • What are cell phones used for?
    8·2 answers
  • The SPF strategy can be proven to be optimal in the sense that it minimizes average response times. In this problem, you will de
    10·1 answer
  • On an XBOX 360, what does it mean if you get 4 red rings on your console?
    5·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
  • What does GEOSYNCHRONICE SATELLITE use for?​
    7·2 answers
  • Which of the following is not a secondary memory. (a) pen drive (b) Hard disk (c) Ram (d) Magnetic disk
    8·1 answer
  • What type pf physical security devices lets a company locate devices that have been moved to a new location?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!