1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
5

A common hardware component found in electronic devices including desktop computers, laptops, tablets and smartphones. The amoun

t of random access memory in a device determines how much memory the operating system and open applications can use. This type of memory is temporary and volatile.
options:

RAM


ROM


Optical storage


Hardware
Computers and Technology
1 answer:
Maurinko [17]3 years ago
8 0

Answer:

A. RAM

Explanation:

RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

You might be interested in
Which customers are typical for the Argriculture,Food, and Natural Resources career cluster?
Ahat [919]

Ecosystem developers

8 0
4 years ago
When methods have ____, other programs and methods may use the methods to get access to the private data.
Nostrana [21]

When methods have public access, other programs and methods may use the methods to get access to the private data.

<h3>What do you mean by public access?</h3>

The Definition of the term public access is known to be a kind of a television channel where anybody can be able to broadcast a program

An example is the city council meeting can be able to broadcast on public access.

Hence, When methods have public access, other programs and methods may use the methods to get access to the private data.

See full question below

When methods have ____, other programs and methods may use the methods to get access to the private data.

a. private access

b. public access

c. complete access

d. all access

Learn more about public access from

brainly.com/question/2736088

#SPJ1

5 0
2 years ago
Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
maw [93]

Answer:

the answer is

Explanation:

3 0
4 years ago
What are the similarities between vertical and horizontal scroll bar​
professor190 [17]

Answer:

1. They both have arrows at the beginning and end of their scroll.

2. They are both used for extending the users view to rangers that are not currently present on the screen.

3. They are both located at the far right bottom of an open program in a computer screen.

4.They can be used in thesame way by dragging the scroll bar or clicking on the arrows on either side of the scroll bar.

Explanation:

Note that:

The vertical scroll bar is the one which extends from top to bottom.

While the horizontal scroll bar extends from left to right.

8 0
3 years ago
Read 2 more answers
_____ describes the way the components in a network interact.​
My name is Ann [436]
Logical Topology describes the way that components in a network interact.  Logical topology is the arrangement of devices on a computer  network and how they communicate with one another.  It describes how signals act on the network.  his type of topology is not interested in how devices on the network are connected but how they communicate with each other.<span> </span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
    12·1 answer
  • What are the two most common form factors used today for computer cases, power supplies, and motherboards?
    15·1 answer
  • Select the correct answer.
    6·1 answer
  • List 10 programs or applications on your computer other than any Microsoft office programs
    11·1 answer
  • How does human error relate to security risks
    5·1 answer
  • A palindrome is a string that reads the same both forward and backward. For example, the string madam is a palindrome. Write a p
    13·1 answer
  • Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem
    8·2 answers
  • Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
    12·1 answer
  • Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's priv
    5·1 answer
  • Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!