1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
8

(--BRAINLIEST--)Explain the types of secondary memory on the basis of data access.​

Computers and Technology
2 answers:
Nina [5.8K]3 years ago
8 0

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
arlik [135]3 years ago
3 0

Answer:

<u>T</u><u>h</u><u>e</u><u> </u><u>t</u><u>y</u><u>p</u><u>e</u><u>s</u><u> </u><u>o</u><u>f</u><u> </u><u>s</u><u>e</u><u>c</u><u>o</u><u>n</u><u>d</u><u>a</u><u>r</u><u>y</u><u> </u><u>m</u><u>e</u><u>m</u><u>o</u><u>r</u><u>y</u><u> </u><u>o</u><u>n</u><u> </u><u>t</u><u>h</u><u>e</u><u> </u><u>b</u><u>a</u><u>s</u><u>i</u><u>s</u><u> </u><u>o</u><u>f</u><u> </u><u>d</u><u>a</u><u>t</u><u>a</u><u> </u><u>a</u><u>c</u><u>e</u><u>s</u><u>s</u><u> </u><u>a</u><u>r</u><u>e</u><u>:</u>

  1. Magnetic tape: magnetic tape is one of the most popular sequentially accessible storage mediums for large data. It is device used for storing back up information. It is made up of Mylar plastic coated with iron oxide on only one side of tape Data is stored in frames across the width of the tape. It is a serial access type storage ever having low cost and has large storage capacity. When a large volume of information is to be processed sequentially it can be stored on magnetic tape, They are durable, can be written, erased, and re written.
  2. Magnetic disk: Magnetic storage devices refer to system that keeps information or data is magnetized material. In this technology data is stored and read with the help of magnetic properties developed while applying electricity on a magnetized medium Magnetic storage offers high storage capacity, reliability and be capacity to directly accessing data. Magnetic disk holds more data in small place and attains faster data access speed. Data can be accessed randomly from magnetic disk.
  3. Hard disk: Hard disk is the most common secondary storage device for all computers. It is the storage medium within the computer that stores large amount of data and provides relative quick access to that data. A hard disk uses and flat aluminum disk called platters. These platters are coated with a special iron oxide or ferric mode material on both sides to store data in the form of magnetic patterns. Platters are mounted by cutting a hole in the centre and stacking them onto a spindle.
  4. Zip disk:They are high capacity removable disk and drive. They have the speed and capacity of hard disk and portability of floppy disk. Zip disk are of the same size as floppy disk, that is:3-½ inch but have a much higher capacity than the floppy disk, Zip disk and drive were made by Iomega Corp. It comes as a complete unit disk, drive, connection cable, power cord and operating system. It can be connected to the computer system externally using a parallel chord or SCSI cable. Their capacity ranges from 100 MB to 750 MB. They can be used to store large files, audio and video data
  5. Flash memory: Flash memory is a long-life and non-volatile storage chip that is widely used in embedded systems. It can keep stored data and information even when the power is off. It can be electrically erased and reprogrammed.
You might be interested in
Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
Strike441 [17]

Answer:

Penetration monitoring is conducted based on the vulnerability evaluation (Were a susceptibility evaluated and mentioned).

Explanation:

Penetration Test

  • Penetration testing is carried out from both within (the network or application) as well as outside that aims to gain access to the system to evaluate if any suspicious activity or improper behavior is likely within the device.
  • When there are some other potential security vulnerabilities, they are all found in the integration check that involves vulnerability assessment for frameworks and checking for network management.
  • Automation of penetration testing is used to make it work better.
  • Penetration monitoring deals with the same risk evaluation correlated with a disadvantage.

Privilege escalation

  • They need to think about known vulnerabilities as the system for network management works conditional on the privilege rates. Such that, increasing user has an article has highlighted and the consumer is only allowed to control or use the resources that should be used appropriately, depending on the level of privilege.
  • If he gets elevated access then it will be a failure to have access control mechanism.

Leaving backdoors

  • The creator uses backdoors to test the system's functionality during the designing processes.
  • The loophole can be a workaround overriding the identification for all users, or a default password.
  • They would need to worry about leaving the backdoor because the backdoor.which is performed either deliberately or involuntarily will circumvent the entire security mechanism.
  • During the intrusion testing process, the both privilege increase and the escape from the gateway can be discovered due to the research being done both inside and outside the device.
  • The tester's testing phase acts as various users so that any destabilization of access may be found.
  • The tester will use all numerous methods to supersede the technique of official approval, but when there are certain backdoors, maybe he can start by pointing that out.

6 0
4 years ago
Question 4 / 5
kkurt [141]

Answer:

it can damage you liver. and you can drink to much and bleed inside.

4 0
3 years ago
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the
Morgarella [4.7K]

Answer:

POST

Explanation:

  • POST stands for Power On Self test.
  • The process of booting the system involves performing the self test POST.
  • POST involves testing the computer hardware which are required for proper functioning of the computer.
  • If the POST test fails, the computer performs the necessary action required for the proper functioning of the computer.It immediately raises alarm ( beeps ) . Different number of beeps represents different devices which are having trouble.
  • So, option (D) is correct option.
  • Option (A) IDE is not the test. So, option (A) is wrong option.
  • Option (B) POTS is not the test.So, option (B) is wrong option.
  • Option (C) QoS is not the test. So, option (C) is wrong option.
7 0
3 years ago
Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then con
Aleksandr [31]

Answer:

c = float(input("Enter the temperature in Celsius: "))

f = c * 1.8 + 32

print("The temperature in Fahrenheit: " + str(f))

k = (f - 32) / 1.8 + 273.15

print("The temperature in Kelvin: " + str(k))

Explanation:

*The code is in Python.

Ask the user to enter the temperature in Celsius

Convert the Celsius to Fahrenheit using the conversion formula and print it

Convert the Fahrenheit to Kelvin using the conversion formula and print it

3 0
3 years ago
You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind
san4es73 [151]

Answer: VLAN(Virtual local area network)

Explanation: VLAN(Virtual local area network) is the networking device that displays the flexible nature due to the logical connection of one or more LANs. VLAN is used for the purpose of the management, security, scaling etc.

VLAN also has the ability to provide the segmentation in the network by dividing the physical network into segments and making logical network. Router is the source for maintaining the communication in the VLAN.

Thus according to the requirement mentioned in the question ,VLAN is the network device that should be used.

8 0
3 years ago
Other questions:
  • _____ provide the standards, syntax, statements, and instructions for writing computer software
    14·1 answer
  • You use a(n) ____ variation when a use case is less specific than others, and you want to be able to substitute the more specifi
    8·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • What would happen if a pc that contains a power supply that does not automatically adjust for input voltage is set to 230 volts
    13·1 answer
  • You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that
    10·1 answer
  • The benefits of flextime include:
    11·2 answers
  • Which guidelines should be used to make formatting tasks more efficient?
    15·2 answers
  • Write a statement that toggles the value of the bool variable onoffswitch. that is, if onoffswitch is false , its value is chang
    10·1 answer
  • 29 POINTS!!!
    6·1 answer
  • Which of the following is another type of brake system used in trucks
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!