what is stored in the memory of a computer? all data reserved for long-term storage for future recall. all files that have been created by users. all information that travels along the bus from one component to another. the programs currently being executed and the data used by those programs. incorrect

Answers

Answer 1

Memory in computing is the retention of data in a storage device for use in processing. A computer's memory consists of RAM, ROM, and cache memory.

All data reserved for long-term storage for future recall is saved on a hard drive or other forms of secondary storage. All files that have been created by users are saved on a hard drive or other forms of secondary storage. All information that travels along the bus from one component to another is stored in the CPU's cache, not in memory.So, the programs currently being executed and the data used by those programs are stored in the memory of a computer. A program is a set of instructions or codes that tell a computer what to do. A program's code is kept in memory while it is running, along with the data it is processing. When a program is closed, its code and data are erased from memory to free up space for other programs. Therefore, the amount of memory a computer has affects its ability to multitask and the speed at which it can perform tasks.

for more such question on hard drive

https://brainly.com/question/1558359

#SPJ11


Related Questions

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose?
Laptop
Gaming Console
Desktop
Server

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following

Answers

Desktop, it can be customised more and laptops are poorly made often, gaming console makes no sense same with server

What is the difference between the DHCP server software and the DHCP client software?

Answers

DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.

The main difference between DHCP server software and DHCP client software is their roles in the DHCP process. DHCP server software is responsible for assigning IP addresses and other network configuration parameters to client devices on a network. It listens for client requests, allocates IP addresses from a pool of available addresses, and provides other configuration parameters to the client.On the other hand, DHCP client software is responsible for requesting an IP address and other network configuration parameters from the DHCP server. The client sends a broadcast message requesting an IP address, and the DHCP server responds with an available IP address and other configuration parameters, which the client uses to configure its network interface.While DHCP server software is typically installed on a server, DHCP client software is typically installed on individual client devices, such as desktop computers, laptops, and mobile devices. DHCP client software is usually built into the operating system of the device and is configured to automatically request an IP address when the device connects to a network.

To learn more about automatically  click on the link below:

brainly.com/question/14510899

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

____ encryption uses two keys instead of only one and these keys are mathematically related.

Answers

The type of encryption you are referring to is called "asymmetric encryption" or "public key encryption".


Behind why two keys are used is that it increases security by ensuring that only the intended recipient can decrypt the message. The sender uses the recipient's public key to encrypt the message, and the recipient uses their private key to decrypt it.

Asymmetric encryption, also known as public-key cryptography, involves using a pair of keys – a public key and a private key. The public key is used to encrypt the data, and the private key is used to decrypt it. These keys are mathematically related, but it is computationally infeasible to derive the private key from the public key, which makes this encryption method secure.

To know more about asymmetric encryption visit:-

https://brainly.com/question/26379578

#SPJ11

what is the difference between a crossover cable that can be used for 100baset networks versus one that is suitable for 1000baset networks?

Answers

A crossover cable that can be used for 100BaseT networks versus one that is suitable for 1000BaseT networks are two types of Ethernet cables. The difference between them is their bandwidths.

This Ethernet cable uses twisted pair cabling and can deliver data at speeds of 100 Mbps. Its wiring scheme allows it to directly connect two Ethernet devices without the need for a hub, switch, or router, making it suitable for small home or office networks.1000BaseT crossover cableA 1000BaseT crossover cable, also known as a Gigabit crossover cable, uses twisted pair cabling to deliver data at speeds of 1 Gbps. It features a different wiring scheme than 100BaseT cables and is designed for use in larger networks that require higher data transmission rates. These cables are used for high-speed LAN transmission and are more commonly used for commercial or enterprise networks.

Learn more about Ethernet cables: https://brainly.com/question/28321001

#SPJ11


please type the answer by computer, not handwriting.
Explain the differences between parametric tests and
nonparametric tests.

Answers

Parametric tests make assumptions about the underlying population distribution and involve parameters, while nonparametric tests do not rely on specific distributional assumptions and are based on ranks or frequencies of data.

Parametric tests are statistical tests that make assumptions about the population distribution and parameters, such as mean and variance. They require the data to meet certain criteria, such as normality and homogeneity of variance. Examples of parametric tests include t-tests and analysis of variance (ANOVA).

Nonparametric tests, on the other hand, do not make assumptions about the population distribution or parameters. They are based on the ranks or frequencies of the data and are more robust to violations of assumptions.

Nonparametric tests are suitable for non-normal or skewed data. Examples of nonparametric tests include the Mann-Whitney U test and the Kruskal-Wallis test. They are commonly used when data do not meet the assumptions of parametric tests or when the data scale is ordinal.

Learn more about Non-parametric tests here:

https://brainly.com/question/32190555

#SPJ4

What are the 4 powers of the executive?

Answers

Bills are signed and vetoed. represent our country in negotiations with other nations. enforce the legislation passed by Congress. serve as the war's commander-in-chief are powers of the executive.

It is up to the executive arm of government to run a state and enforce the law. Political systems based on the concept of separation of powers distribute authority among multiple branches in order to prevent the concentration of power in the hands of a single group of people. Under such a system, the executive does not enact or interpret laws. Instead, the executive implements the law as it was crafted by the legislative branch and decided upon by the judicial system. For instance, the executive may have issued a decree or executive order. Typically, regulations are created by executive bureaucracies.

Learn more about executive from

brainly.com/question/496263

#SPJ4

Roland knew that the code to his sister toy safe was only two digits ong he was able to crack the safe open by attempting every two digit code until he found the correct one what method code breaking did Roland use

Answers

Answer:

Brute-force attack

Explanation:

a brute force attack is when you use a bunch of random passwords in the hopes of eventually getting it right

Answer:

Permutation cipher

This is a complete enumeration of all possible keys of small length (we have a length of 2).

The first digit is 1, 2, 3, ..., 8, 9.

Second digit 0, 1, 2,…, 8, 9

Number of options: 9*10 = 90

10, 11, 12, … 97, 98, 99

At one time, ibm was one of the largest manufacturers of personal computers. What was a product that ibm was well known for that came before computer?.

Answers

Answer:

A counting machine

Explanation:

IBM was well known for making a counting machine before they made computers

1. What pricing strategy is used by local electric
distributors/retailers in charging us monthly electric bills?

Answers

Local electric distributors/retailers are the ones that distribute and sell electricity to the consumers.

They need to have a pricing strategy to charge the consumers a fair price for their services. There are different pricing strategies used by these companies to charge the monthly electric bills.One of the most common pricing strategies used by local electric distributors/retailers is the Cost-plus pricing strategy. This strategy involves adding a markup to the total cost of providing the service. The markup is added to cover the expenses and generate a profit for the company. This pricing strategy is commonly used by regulated utilities as the markup is reviewed and approved by the regulatory commission.

The second pricing strategy is the value-based pricing strategy. This strategy involves charging the customers based on the value they receive from the service. For example, a customer who consumes more electricity will be charged more. This pricing strategy is common in competitive markets where different electric distributors/retailers are competing to win customers.The third pricing strategy is the demand-based pricing strategy. This strategy involves charging the customers based on the demand for electricity.

During peak hours, when the demand is high, the price of electricity is high. During off-peak hours, when the demand is low, the price of electricity is low. This pricing strategy is used to encourage the customers to use electricity during off-peak hours and reduce the load during peak hours.In conclusion, local electric distributors/retailers use different pricing strategies to charge the consumers monthly electric bills. The choice of pricing strategy depends on various factors such as the regulatory environment, market competition, and customer demand.

Learn more about customer :

https://brainly.com/question/13472502

#SPJ11

PLS HURRY!!! Look at the image below!
The choices for the second part are number +1, number, number -1

PLS HURRY!!! Look at the image below!The choices for the second part are number +1, number, number -1

Answers

1. <1

2. -1

Explanation:

1. Let’s assume you have a folder named “stuff” and you wish to make “stuff” readable and writable for the owner, readable by groups and others, how would you do this?



2. Interpret these permissions: dr-xrw--w-

Owner:

Group:

Other:

Answers

Answer:

it is owner

Explanation:

q uizlet what is the best practice as stated within the lecture and text for answering the questions: when is it appropriate to email a thank you note for an interview?

Answers

In most cases, it is considered a good practice to send a thank-you note or email to the interviewer(s) within 24-48 hours after the interview.

This demonstrates your appreciation for their time and interest in the position, and can also help you stand out from other candidates.

In your note/email, be sure to express your gratitude for the opportunity to interview, reiterate your interest in the position, and highlight any particular topics or aspects of the interview that you found especially interesting. Also, be sure to proofread your note/email carefully for spelling and grammar mistakes.

Learn more about interview:

https://brainly.com/question/8846894

#SPJ11

A switch to kernel mode, wherein the operating system performs some action before returning control to the originating process?

Answers

A switch to kernel mode, wherein the operating system performs some action before returning control to the originating process is known to be called trap.

What is TRAP in computing?

A trap is known to be a kind of a synchronous interrupt triggered that is said to be done by an exception in that of a user process to carry out functionality.

Note that the Exception conditions such as invalid memory access, division by zero, is said to be one that can alter or  trigger a trap in an OS. A trap alters the mode of an OS to that of a kernel routine.

Hence, A switch to kernel mode, wherein the operating system performs some action before returning control to the originating process is known to be called trap.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ4

Explain the simliparities or difference between a workbook , worksheet and spread sheet​

Answers

Answer:

Spreadsheet vs Workbook. Summary: Difference Between Spreadsheet and Workbook is that Spreadsheet software allows users to organize data in rows and columns and perform calculations on the data. ... While Workbook is consider as whole file that can contain bundle of worksheets in it.

Explanation:

mark brainlyist

true or false: the only goal of search engine optimization is to rank well for a single search query.

Answers

True, Search engine optimization (SEO) is the way of ranking during searching anything over it.

Goals of SEO:

Obtain high search engine rankingsIncrease the return on sales investment.Boost your competitive advantage.Increase the size of your customer base and target audience.Boost website traffic

What is Search engine optimization (SEO)?

SEO is an acronym that stands for "search engine optimization." It is the process of improving your website so that it appears more prominently when people search for services or products related to the company on Go_ogle, B_ing, and a variety of other search engines.

The higher your pages rank in search results, the more likely it is that you will attract attention as well as new and existing customers.

To know more about Search engine optimization (SEO), visit: https://brainly.com/question/20512550

#SPJ4

What is used to create a program that runs on a web server and deals with generation of the content of a web page to satisfy an end-user's request?

Answers

The thing that is used to create a program that runs on a web server and deals with generation of the content of a web page to satisfy an end-user's request is  server-side programming.

What is server-side programing?

Developers can employ sessions, which are essentially a method that allows a server to keep information on the current user of a site and send various answers based on that information, by using server-side programming.

All forms of applications that operate on the web server are collectively referred to as server side programming. They handle user input, work with databases, and decide what information is returned to the client in response to his request.

Therefore, Client-side development solicits user feedback. Developers can use JavaScript, for instance, to make forms that gather user input. Server-side development is processing this input in the interim. Developers can use PHP, for instance, to link a database to a website and send data entered by users to the database.

Learn more about server-side programming from

https://brainly.com/question/15993059
#SPJ1

Please help! In your own words explain the difference between a problem and an algorithm.

Answers

Answer:

A "problem" is a problem or issue that has harm, that needs to be solved. "Algorithm" is the name of the path drawn to solve the question. Each specified stage is an algorithm

A task which has to be solved can be described as a problem. For instance, we need to calculate the average age of males and female in a class. These task of obtaining the age of students is a problem.

To solve a problem, we need to undergo a sequence or series of steps in other to arrive at the appropriate answer or conclusion. These series of steps taken to solve a task is called an algorithm.

Therefore, while problem is a task that needs to be solved, an algorithm is the sequential step taken to solve a problem.

Learn more : https://brainly.com/question/19323897

Describe an example where you want to solve for a balanced fnet= 0n. Be specific and detailed.

Answers

The example for balanced Fnet=0N is a closed door pushed by two persons using the same amount of force.

What is balanced program?

Balanced program is defined as a requirement of numerous public service broadcasting regulations. The justification for this is that balanced programming allows for a variety of viewpoints and guarantees that all members of the population have equal access to information.

Forces that are balanced and unbalanced. As the name suggests, the forces operating on the object become balanced and cancel each other out in balanced force, which results in a net force of zero.

Thus, the example for balanced Fnet=0N is a closed door pushed by two persons using the same amount of force.

To learn more about balanced program, refer to the link below:

https://brainly.com/question/16775811

#SPJ1

Order the steps to use a logical argument as a rule type.

ANSWER:
Click the home tab, then click the styles group > Click conditional formatting > Click new rule > Use a formula to determine

Answers

pleaaase I need the points

Explanation:

public class Bird private String species; private String color; private boolean canFly; public Bird (String str, String col, boolean c species = str; color = col; canFly = cf; Which of the following constructors, if added to the Bird class, will cause a compilat public Bird () species = "unknown"; color = "unknown"; canFly = false; public Bird (boolean cf) species = "unknown"; color = "unknown"; canFly = cf; public Bird (String col, String str) species = str; color = col; canFly = false; public Bird (boolean cf, String str, String col) species = str; color = col; canfly = cf; public Bird (String col, String str, boolean cf) species = str; color = col; canFly = cf;

Answers

The constructors, if added to the Bird class, will cause a compilation error is given here:

public Bird(String col, String str, boolean cf)

{

species = str;

color = col;

canFly = cf;

}

What are constructor?

A function Object() { [native code] } is a special method of the a class as well as structure that initialises a newly created item of that type in object-oriented programming. When an object is created, the function Object() { [native code] } is automatically called. In that it shares the same name as that of the class and has the ability to set the values of the an object's members to either default or user-defined values, a function Object() { [native code] } is comparable to an instance method. A function Object() { [native code] } is not a proper method despite looking similar because it doesn't have a return type. The function Object() { [native code] } cannot be static, final, abstract, or synchronised because it initialises the object rather than carrying out a task by running code.

Learn more about constructor

https://brainly.com/question/13267121

#SPJ4

which of the following is an example of output devices​

Answers

show the optionnn as there are a lot of examples like monitor

Answer:

monitor,printer,speaker e.t.c

In neighbourhood A, there is only one SPA center called JBI SPA. JBI provides a SPA service to their customers where most of whom are living in this neighbourhood and have been contacting with JBI SPA for many years. JBI's demand curve is: P = 30 - Q, and JBI's marginal cost of service is: MC = 4Q. JBI charges a single price for a unit of service.
At profit maximization level, calculate the following:
a) Price Level:_____
b) Output level:_____
c) Consumer surplus: _____
d) If JBI enforces first-degree price discrimination, the lowest priced charged is: ____ and the output level is: _____
e) Ignoring any fixed costs and under perfect price discrimination, JBI's total profit is:_____

Answers

At profit maximization level, the price level, output level and consumer surplus is given as follows:a) Price Level:The profit maximization condition of JBI Spa is given by MR = MC.Substitute the value of MR in terms of P, we have;P/2 = surplus:Consumer surplus (CS) is the difference between what the customers are willing to pay for a good or service and the actual price they pay for it.

The formula for consumer surplus is given as;CS = 0.5 * (Pmax - P) * Q, where Pmax = 30.Substitute the values of P, Pmax, and Q in the above formula, we get;CS = 0.5 * (30 - 8Q*) * Q*CS = 0.5 * (30 - 8(3.33)) * 3.33CS = $37.17d) If JBI enforces first-degree price discrimination, the lowest priced charged is and the output level is:The lowest price charged under first-degree price discrimination is the reservation price, which is equal to the maximum amount of money each customer is willing to pay for the service.

Since most of JBI's customers have been contacting with JBI Spa for many years, we can assume that their maximum willingness to pay is not too different from the price they are currently paying.So, the reservation price under first-degree price discrimination is equal to the current price level, which is P* = 8Q*.The output level under first-degree under perfect price discrimination, JBI's total profit is:Under perfect price discrimination, JBI can extract all the consumer surplus from its customers, which means P = MC = 4Q*.Substitute Q* = 3.33 in the above equation, we have;P = 4(3.33) = $13.33JBI's total profit under perfect price discrimination is equal to the total revenue which is given as;Total revenue = P * Q* = 13.33 * 3.33Total revenue = $44.45Thus, ignoring any fixed costs and under perfect price discrimination, JBI's total profit is $44.45.

To know more about maximization visit:

brainly.com/question/33009813

#SPJ11

50. List any three sources of graphics that can be used in Microsoft word.​

Answers

Answer:

1. Shapes: Microsoft Word includes a variety of pre-designed shapes that can be easily inserted into a document, such as circles, squares, arrows, and stars.

2. Clipart: Microsoft Word includes a large collection of clipart images that can be inserted into a document to add visual interest. These images can be searched for and inserted using the "Insert" menu.

3. Images: Microsoft Word also allows you to insert your own images, such as photographs or illustrations, into a document. These images can be inserted by using the "Insert" menu and selecting "Picture" from the options.

remote acquisitions are often easier because you’re usually dealing with large volumes of data.
T/F

Answers

False. Remote acquisitions are not necessarily easier just because you're dealing with large volumes of data.

Remote acquisitions refer to the process of collecting or obtaining data from a remote location, typically over a network or the Internet. The ease or difficulty of remote acquisitions depends on various factors, including the nature of the data, the complexity of the remote system or network, and the available infrastructure. While it is true that remote acquisitions may involve large volumes of data, the size of the data alone does not determine the ease or difficulty of the process. Remote acquisitions can present challenges such as network latency, bandwidth limitations, security considerations, and compatibility issues between systems. These factors can make remote acquisitions complex and require careful planning and execution. Additionally, the ease of acquiring data remotely can vary depending on the specific tools, protocols, and technologies available for data transfer and retrieval. Therefore, it is incorrect to assume that remote acquisitions are always easier solely based on dealing with large volumes of data.

learn more about network here:

https://brainly.com/question/29350844

#SPJ11

Flight tracker assignment 9 on project stem answer

Answers

Answer:

ExplanaPls answer this

do atleast 3 paragraphs

thanks so much

worth 100 pointstion:

The calendar is a system used to organize and keep track of time. It consists of a series of months, each with a specific number of days, and is used to mark important dates such as holidays and events.

What are the most common calender?

The most commonly used calendar is the Gregorian calendar, which has 12 months, with a varying number of days in each month. To keep track of the year, the calendar also has a system of leap years to account for the extra time it takes for the Earth to orbit the sun.

The calendar has been used for centuries as a way to organize society and plan events. It is important for individuals to have an understanding of the calendar and how it works to effectively plan their lives and schedules.

With the advancement of technology, calendars have become digital and can be easily accessed through smartphones and other electronic devices. understanding the calendar is an important skill for individuals to have in order to effectively manage their time and plan for important events in their lives.

To learn more about system click the link below:

brainly.com/question/18168133

#SPJ2

Help me please, with my work in Exel.

Answers

i’m not sure on how I can help

how can you recover efs-encrypted files if the user profile holding the digital certificate is accidentally deleted? (choose all that apply.)

Answers

If the user profile holding the digital certificate is accidentally deleted, the following methods can be used to recover EFS-encrypted files.

1. If a backup of the digital certificate and private key was created, it can be restored to recover access to the encrypted files.
2. If the user had previously exported the certificate and private key and stored them in a safe location, they can be imported to regain access to the encrypted files.
3. If the recovery agent for EFS was configured on the system, it can be used to recover access to the encrypted files.
4. If none of the above options are available, it may not be possible to recover the encrypted files and they may be permanently lost.

EFS is a user-based encryption control method that gives users the ability to decide who has access to the files on their system. Encryption is usually done at the folder level when using EFS. This guarantees that every file added to the encrypted folder will be encrypted automatically.

To know more about encryption, click here:

https://brainly.com/question/30225557

#SPJ11

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

PLEASE HELP Type the correct answer in the box. Spell all words correctly. Ross wants to add a graph from a text file format into his database. Which feature will enable him to add the graph in his database? Ross can use the______data feature to add the graph in his database.

Answers

Answer:

the answer to your problem is (insert)

Explanation:

Click Chart under the Illustrations group on the Insert tab.The Insert Chart dialogue box's arrows can be used to cycle through the various chart kinds.Click OK after selecting the type of chart you like.

What insert data feature to add the graph?

Select Data by selecting with the right mouse button on the chart. The Select Data Source dialogue box appears on the worksheet where the chart's source data are placed.

Click in the worksheet, then click and drag to choose all the data you wish to use for the chart, including the new data series, while keeping the dialogue box open.

The Insert SQL command is used to add new records or data to tables. Because it is used to alter database data, it is seen as falling within the umbrella of statements known as Data Manipulation Language (DML).

Therefore, insert data feature to add the graph in his database.

Learn more about insert data here:

https://brainly.com/question/14331259

#SPJ2

Other Questions
Which roles could the nurse assign to unlicensed assistive personnel (uap) in caring for a client with a cast? select all that apply. one, some, or all responses may be correct. Write a summary of this Article. "Hearts of Our People" from: achieve3000 Children and adults purchased tickets for a local amusement park.all tickets were sold at the park entrance-season passes,discount,atc.were not allowed.A childs tickets cost $8 while an adult ticket cost $15.A total of 5,500 was collected.600 tickets were sold.how many of each type of ticket were sold? The US Senate overwhelmingly passed the 2022 Defense Authorization Act. The $768 billion "Defense Authorization Act" not only exceeds the defense spending proposed by the Biden administration by $25 billion, but also increases the US defense budget by about 5% compared to last year. x^2-6x-16 when factored is The following are prices of selected digital cameras. $158, $95 ,$175, $180 ,$95,$129, $228, $300 Find the standard deviation. Solve the equation. Simplify your answer if possible.1/6x - 5/3 = 1The solution to the set is { } do you think you would be more likely to lease an apartment or buy a house when you decide to live on your own? in either case, why is it important to have a good credit report? there are two strategies to motivation. for example, at a party, you might eat 10 potato chips when hungry but only five when you are not. this is an example of: what is the population of Barbados? A particular airport has beacons on the ground 6 km out from the start of each runway. An airplane is directly over this beacon and is at an angle of elevation from the runway of 8. Calculate the direct line distance from the airplane to the start of the runway Expand the brackets and simplify theexpression below.8(3y + 2) + 4y What did Nikita, dictator of USSR publicly call Stallin? Ipaa protects a category of information known as protected health information (phi). phi covered under hipaa includes:______. a work system has five stations that have process times of 5, 9, 4, 9, and 8. what is the throughput time of the system? group of answer choices 35 4 7 18 9 Industrialization gave workers shorter working hours and time off on weekends, which allowed for more jobs per person. lower salaries. fewer sick days. more leisure time. Can someone tell me where and how I graph this? Simplify the expression.5+2[(2+2)5+5] How many really solutions does 4a^2 = 8a 4 have 60 points!!!In at least 150-200 words, compare and contrast the First and Second Continental Congress.