1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
13

Hlo friends what is full form of RAM and ROM ​

Computers and Technology
2 answers:
Usimov [2.4K]3 years ago
6 0

Answer:

Hello.

Explanation:

The full form of

RAM=Random Acess Memory.

ROM=Read Only Memory.

aalyn [17]3 years ago
4 0
RAM=random-access memory
ROM=read only memory
You might be interested in
A software package developed to handle information requirements for a specific type of business is called a(n) ____. A. outsourc
kotykmax [81]

Answer:

Option D i.e., ​vertical application.

Explanation:

A vertical application is called a software package formed to manage the data necessary for a particular form of corporation.

A vertical application is an application that assists a particular firm's method as well as aimed a lower amount of persons within a corporation who have particular skill pairs and work duties.

  • Option A is incorrect about the following scenario because It's the method of recruiting the network operator to establish or improve the section of commercial-use apps.
  • Option B is incorrect about the following scenario because It is an application that an entity has built for its inner usage, which is being further popular.
  • Option B is incorrect about the following scenario because it is the opposite of the vertical application.
6 0
3 years ago
Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the c
Phantasy [73]
<h3>What is Network forensics ?</h3>

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

brainly.com/question/24756209

#SPJ1

5 0
2 years ago
How technology bacome the mode of revealing​
maria [59]

Answer:

afefdasf

Explanation:

3 0
3 years ago
This logo bby im sorry huhu​
Stels [109]

Answer:

I believe this was for someone else online, Unfortunately that's a little weird to be dating here ya know, Never know if there is someone really old or young you could be dating.

7 0
3 years ago
What is the answer ????​
gtnhenbr [62]

Answer:

<h2>iv. NINGUNO DE LOS ANTERIORES</h2>

Explanation:

<h2>Hola</h2>
8 0
3 years ago
Other questions:
  • What is the final step used when designing an algorithm?
    14·1 answer
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same
    5·1 answer
  • Users at UC need to be able to quickly create a Resource record from the Project record's Chatter feed How should the App Builde
    10·1 answer
  • Choose the type of error described.
    12·1 answer
  • Facts and statistics collected together to be used for different purposes is
    14·1 answer
  • Write an algorithm to find the average of three numbers: 10, 20, 30
    7·1 answer
  • Five varieties of software​
    13·1 answer
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
  • 1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!