1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
9

Which is the fastest memory in computer​

Computers and Technology
2 answers:
Misha Larkins [42]3 years ago
8 0

Answer:Cache memory

Explanation:

Cache memory is the fastest system memory, required to keep up with the CPU as it fetches and executes instructions. The data most frequently used by the CPU is stored in cache memory. The fastest portion of the CPU cache is the register file, which contains multiple registers.

polet [3.4K]3 years ago
5 0

Answer: Cache memory

Explanation: Cache memory is the fastest system memory, required to keep up with the CPU as it fetches and executes instructions. The data most frequently used by the CPU is stored in cache memory. The fastest portion of the CPU cache is the register file, which contains multiple registers.

You might be interested in
Which composer below was not part of the classical period? <br> A. Beethoven B. Bach<br> C. Mozart
castortr0y [4]

Explanation:

B. Bach

Thanks for your point

3 0
3 years ago
A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
Anna35 [415]
<span>A selective backup allows a user to choose specific files to back up, regardless of whether or not the files have been changed.</span>
7 0
3 years ago
Travelers should keep their profile information up-to-date. which is not an option for a traveler to update their own profile in
Komok [63]

After logging onto DTS, on the Welcome screen, hover over Traveler Setup and select Update Personal Profile.

<h3>What is Setup?</h3>

Setup is the arrangement of something, or a competition when the winner is already known because the two competitors are not evenly matched. The setup of food and beverages at a party is an illustration of a setup. A setup might involve pairing a strong debater with a weak debater.

Whether we like it or not, US English spellings have a significant influence on a lot of our language today. Therefore, the phrase "setup" is used when discussing the start of computer programs, but in all other contexts, the words "to set up" and "the set-up" are used instead.

Informal. an endeavor or competition that is made purposefully simple. a game or contest where the opponent can be easily defeated without risk or effort.

To learn more about Setup from the given link:

brainly.com/question/25736513

#SPJ4

4 0
2 years ago
Which media vehicle uses the Dreamweaver software for its design? A(n) "blank" uses the Dreamweaver software for its design.
Inessa [10]
Answer: Websites

Explanation: Adobe Dreamweaver CC is a web design and an Integrated Development Environment (IDE) application that is used to develop and design websites.
3 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Other questions:
  • Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
    12·1 answer
  • How to connect to my wireless printer for dummies?
    12·1 answer
  • What is a taskbar?
    5·1 answer
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • The Linux operating system was created by which software engineer?
    15·1 answer
  • The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,
    15·1 answer
  • What type of things can be marketed
    11·1 answer
  • What is the meaning of delegation
    13·2 answers
  • How do i delete an account for brainly how do i delete everything
    7·2 answers
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!