1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio [31]
3 years ago
14

Which storage is faster than secondary storage​

Computers and Technology
2 answers:
kozerog [31]3 years ago
5 0

Answer:

RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.22-Aug-2019

marta [7]3 years ago
5 0

Answer:

primary storage is faster than secondary storage

You might be interested in
Which risk management framework does the organization of standardization publish
olga2289 [7]

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

3 0
4 years ago
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
What is the first computer was brought in nepal and for what purpose​
german

Answer:

The first computer bought in Nepal was IBM 1401 which was brought by the goverment in lease for the populations census of 1972.

7 0
3 years ago
Read 2 more answers
Someone who is young, lacks funds, and really wants to gain technical skills while serving his or her nation should consider
Alja [10]
I think they should join the military.
It is free, so they don't have to think about spending too much money on various courses. And obviously, they will be serving their nation if they are in the military. Online courses won't give them hands on experience, and your other options aren't free.
6 0
3 years ago
What makes an operating system the master controller
IceJOKER [234]

Answer:

An operating system is a master control program, which controls the functions of the computer system as a whole and the running of application programs. All computers do not use the same operating systems.

Explanation:

5 0
3 years ago
Other questions:
  • Type the correct answer in the box.
    7·1 answer
  • Where would be the most likely place to find the keyboard combination used to toggle a keyboard backlight on or off?
    8·1 answer
  • What impacts the types of logs and events logged on a server?
    14·1 answer
  • Social scientists who study criminal behavior.
    7·2 answers
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • List three things that scientists learned about earth beginning in the 1800s
    13·1 answer
  • Use the drop-down menus to select the type of goal described in each statement. I want to finish all of my social studies homewo
    14·1 answer
  • Which tab should you click if you want to access the Show All Comments option in a worksheet?
    13·2 answers
  • What method do phishing and spoofing scammers use
    12·1 answer
  • What is the relationship between hardware and software technology tools?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!