1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
9

Wht is RAM called Random Access memory and ROM IS called Read only memory​

Computers and Technology
1 answer:
nasty-shy [4]3 years ago
6 0

Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.

Explanation: Hope this helps :)

You might be interested in
WILL MARK BRAINLIST. Which best describes a benefit of using the Meeting Window to create a meeting? A.Only the appointment deta
Ray Of Light [21]

I am not sure but my guess would be c.

5 0
3 years ago
Does anyone have 2.19.4 Guess a number 2.0 code for codehs?
lubasha [3.4K]

Answer:

I'm trying to create a program that will ask the user for an exam score in the range 0 to 100. ... I want to take the python course but I have not class code, anyone can help?

Explanation:

3 0
3 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
Shalnov [3]

Answer:

Gramm-Leach-Bliley Act is the correct answer.

Explanation:

8 0
3 years ago
Why would you not restore a Domain Controller that was last backed up twelve months ago
Angelina_Jolie [31]

Answer:

All the data and information that was updated or added since then will be lost so it is useless to restore a Domain Controller that was backedup twelve months ago.

Explanation:

A domain conttoller back-up must be prepared on regular basis else if DC breaks, restoration of most recent database will be impossible.

7 0
3 years ago
Other questions:
  • Who defined the term crowdsourcing in a Wired magazine article?
    15·1 answer
  • Data mining must usestatistics to analyze data.<br> True<br> False
    12·1 answer
  • A display that is thin, flexible, light, and easy to read in all types of light is a(n) _____. touch screen computer. electronic
    13·2 answers
  • A firewall, when properly implemented, can prevent most attacks on your system.
    12·2 answers
  • To add a row labeled "total" to a query design click the ____ button in the show/hide group on the design tab on the ribbon.
    14·2 answers
  • To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
    13·1 answer
  • Which key retains its uniqueness even after you remove some of the fields?
    14·1 answer
  • Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. S
    14·1 answer
  • Which of the two do you think is the most secure mode of communicating: sending a letter using the postal service or sending an
    9·1 answer
  • It is used to loosen or tighten slotted screws. * 1 point A. Hex Driver B. Torx Screwdriver C. Philips Head Screwdriver D. Flat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!