1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
3 years ago
5

The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing

memory the hard disk long-term access memory
Computers and Technology
1 answer:
GuDViN [60]3 years ago
6 0

Answer:

primary memory

Explanation:

it holds temporarily data for processing in the RAM and ROM

You might be interested in
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
4 years ago
Nick won a $1,000 lottery prize. He can't decide what he should spend the money on. For some time now, he has been planning to b
miv72 [106K]
The opportunity cost is the full cost of the trip
4 0
3 years ago
Imagine you are having a conversation about simulation training programs with one of your friends (it is a slow night). You are
Marina86 [1]
I'd simply say that everyone has their own opinions. Some people don't want to experience it in real life because they fear they may mess up. Hence why we have simulations of things, to help people who don't want to experience something in real life and prepare them for when they decide to go out and actually do it.
3 0
4 years ago
Which section of a cover letter would include your skills education and work experience
trasher [3.6K]
Resume. I do believe
8 0
3 years ago
Read 2 more answers
What is the utility of a lever?
Kamila [148]
Muy cosas.
 fazer una montanha russa andar,ativar una armadilha, ativar una puerta etc.
3 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is true about a point-and-shoot camera? They always have lenses that you can take on and off. They are of
    8·2 answers
  • Without a(n) ____, a computer cannot function.
    8·2 answers
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • Are MP3 files are quick to transfer.
    11·1 answer
  • What port does the DarkComet malware listen on?
    15·1 answer
  • How and why do engineers use models?
    15·1 answer
  • A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app
    13·2 answers
  • Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
    6·1 answer
  • An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on
    12·1 answer
  • You are building a game that needs to do the following:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!