1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sunny_sXe [5.5K]
2 years ago
6

Which storage device is not recommended as a permanent storage solution?

Computers and Technology
1 answer:
Brut [27]2 years ago
8 0

Answer:

In comparison to permanent storage, non-permanent storage, also called volatile memory, is a storage device whose data is lost when its power source is disconnected. Examples of non-permanent storage include CPU cache and RAM.

Explanation:

i just know

You might be interested in
1. Who was able to complete the puzzle the fastest in Trial 1?
KATRIN_1 [288]

Answer:

You...answered all of the questions.

Explanation:

All of them have a response!

8 0
3 years ago
Which of the following refers to a technology with a three-dimensional computer simulation in which a person actively and physic
weqwewe [10]

Answer:

B. Virtual reality

Explanation:

In a virtual reality context, the visual and auditory senses of the user are fed by data (images, sounds) from the computer using a goggle and earphones.  That allows the person to be totally cut off her real physical environment and be totally immersed into the world (reality) managed by the computer.

Not to be confused with<u> augmented reality</u>, where the physical reality and perception of it aren't changed... but an additional layer of information is added on top of it.  Like pointing your phone camera to a building and getting information about the building displayed on your phone.

7 0
3 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
write a program in python to input 3 sides of a triangle. check if the triangle is equilateral, isosceles or scalene. use logica
hjlf
<h2>Type of Triangle - Python</h2>

In Geometry, a triangle is a three-sided polygon with three edges and three vertices. A triangle with vertices A, B, and C denoted ∆ABC.

<h3>Equilateral Triangle</h3>

A triangle is said to be an EQUILATERAL TRIANGLE if all the sides are equal in measure.

<h3>Isosceles Triangle</h3>

A triangle is said to be an ISOSCELES TRIANGLE if any two sides are equal in measure.

<h3>Scalene Triangle</h3>

A triangle is said to be a SCALENE TRIANGLE if none of the sides are equal in measure.

<h3>Here's our program:-</h3>

a = float(input("Enter the length of the first side of a triangle: "))

b = float(input("Enter the length of the

second side of a triangle: "))

c = float(input("Enter the length of the third side of a triangle: "))

if (a == b and b == c and c == a):

print("Equilateral Triangle.")

elif (a == b or b = c or c == a):

print("Isosceles Triangle.")

elif (a != b and b !=c and c != a):

print("Scalene Triangle.")

<h3>else:</h3>

print("Invalid Input.")

6 0
2 years ago
Selecting the Tiled windows arrangement option places the windows in a(n) _______ pattern on the screen.
Archy [21]

Answer:

Selecting the Tiled windows arrangement option places the windows in a(n) Grid pattern on the screen.

Explanation:

3 0
2 years ago
Other questions:
  • HELPPP ASAPP
    8·2 answers
  • Remembering on which continent 5 different countries are located
    15·1 answer
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • What device provides ports to allow a laptop to easily connect to a full-sized monitor, keyboard, ac power adapter, and other pe
    11·1 answer
  • Write a for loop that computes the following sum: 5+10+15+20+...+485+490+495+500. The sum should be placed in a variable sum tha
    7·1 answer
  • Is it possible for a PowerPoint user to add notes to slides and see the added comments
    10·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • JAVA<br>plzz help...............​
    7·1 answer
  • What are node in a computer network​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!