Write the difference between:
a) RAM and hard disk
b) RAM and ROM
c) Volatile memory and non-volatile memory
d) DVD and floppy disk

Answers

Answer 1

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

Answer 2

Answer:

RAM is used to store computer programs and data that CPU needs in real time.  RAM data is volatile and is erased once computer is switched off.

Hard disk has permanent storage and it is used to store user specific data and operating system files

RAM =  Random access memory ;is volatile memory that temporarily stores the files you are working on

ROM = Read-only memory ;is non-volatile memory that permanently stores instructions for your computer

Similarities : They are present in the computer.

Volatile memory and non-volatile memory is RAM and ROM

(d.) Floppy disk is a magnetic storage medium with only a 1.44 M capacity, while a CD is an optical disc that can store 700M CDs are based on physical dimples on the disk surface.

Floppies cannot store much at all A CD will hold more than 450 floppies.

Explanation:


Related Questions

OS is a mediator between hardware and user

Answers

Answer:

Os is a set of programs that manage computer hardware and application software.

Explanation:

Operating system as the mediator between that hardware and the software to the program in input output process.

Os share the input output between program to the using the central processing unit, and they generated by the output input control.Os is the there are two types:- (1) application software (2) system software.(1) Application software that program to manage the computer operation.(2) System software the program to user perform a task in particular way.Os communicate to the computer to know the computer language, operating system developed to the manage storage.Operating system to allow the access and file system to the network security  that program execution and protected mode.Operating system to contain that information and resource to the system protection.Operating system hardware and user to manage the virtual management  and resource allocation.

In a Comparative Government course, the first unit focuses on the US Congress and the
second unit focuses on the British Parliament. When reading the textbook before class,
John tries to understand Parliament by relating it to his knowledge of Congress. What
is this an example of?

Elaboration
Retrieval practice
Monitoring
Summarization

Answers

Answer: The answer is Summarization

The method that's used by John is referred to as the retrieval practice.

Retrieval practice refers to a strategy that is used when an individual tries to retrieve a particular information that he or she already learned in order to boost learning.

Retrieval practice is also used to enhance the mind of the person. Since John tries to understand Parliament by relating it to what he already knows about Congress, then this is retrieval practice.

Read related question on:

https://brainly.com/question/21981917

Which of the following STEM discoverers developed a new type of computer hardware?

Answers

Which of the following STEM discoverers is known for creating complex computational physics to develop computer models to simulate fluid movement?

Edison

Fedkiw

Gates

Hawking

Answer:

Fedkiw

Explanation:

Ronald Fedkiw is a professor at Stanford and also a STEM discoverer that is credited with developing a new type of computer hardware model which was used to simulate fluid movements.

His invention has helped him win various awards because it has helped professionals and technicians create visual effects for videos.

The Google brand name appears on thousands of websites due to its ________ API. Select one: a. proprietary b. open source c. closed source d. user-controlled

Answers

Answer: open source

Explanation:

Typically, most applications that we run on our computer usually consist of a user interface. An application programming interface is also just an interface, which is not meant for users but rather applications.

The Google brand name appears on thousands of websites due to its open source API.

What are some things you can do to clean up your digital footprint.

Answers

Answer:

Clear your search history and erase your IP address.

Explanation:

Throw your router out a 2-Story window. It's simple. Now go commit not alive.

You're done!!

You have a multi-domain Windows Server 2016 forest. You need to make a shared folder available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?

Answers

Answer:

Universal

Explanation:

The active directory has the following group scopes based on the level the group will be granted permission;

Universal

Global

Domain Local

With the Universal group all accounts within the domains located in the network forest can be added as well as Global groups and Universal groups within the same forest can be added. Members in the Universal group can be granted permissions to the resources on any domain located in the forest.

The "global digital divide" is a digital divide between countries. True or False?

Answers

Answer:

False I think

Explanation:

Answer:

False ofcourse

Explanation:

write a qbasic programming to calculate and display the total price of 100 pens if a pen costs Rs.20?

Answers

Answer:

2000

Explanation:

if one pen cost 20 then 100 pen=20×100=2000

How many steps are there on Mail Merge Task Pane? List them.​

Answers

Answer:

There are six steps in the Mail Merge Task Pane.

Select the document type. Start the document. Select recipients. Write your letter. Preview your letters. Complete the merge.

Explanation:

Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to  create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and  over.  

Which of the following is true about ethical issues in graphic design?
A. Ethical issues force designers to create unbiased designs.
B. Unethical behavior rarely occurs in the graphic design industry.
C. Closely imitating the work of another designer is considered unethical.
D. Understanding ethical issues reduce the amount of design work that is plagiarized.

Answers

Answer: The Answer Is B

Explanation:

I Did It On Edge

It should be B) Unethical behavior rarely occurs in the graphic design industry, i got it right on Edge

Also im sorry im a month late

What is the primary browser of Windows 10?

Answers

Answer:

Microsoft Edge

Explanation:

The new and updated Microsoft Edge is the main browser of the Windows 10. Hope this helps!

The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * symbol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8)

Answers

Answer:

The correct program is as follows:

num = float(input ("Enter a number: "))

print(num * 8)

Explanation:

Notice the difference between (1)

num = float(input ("Enter a number: "))

print (num * 8)

and (2)

input ("Enter a number: ")

print(num * 8)

Program 1 is correct because:

- On line 1, it takes user input in numeric form, unlike (2) which takes it input as string

- On line 2, the program multiplies the user input by 8 and prints it out

Mr. Brown makes $400 an hour as an attorney and is considering paying someone $1,000 to paint his house. This job will take four days to complete.

1. What are the possible options for Mr. Brown?

Answers

Answer:

His opportunity cost for doing it himself is the lost wages for four hours of work. $1,600-$1,000 = $600 opportunity cost

Explanation:

What technique do API developers most commonly use to limit access to an API to authorised individuals and applications?

Answers

Answer:

API keys

Explanation:

API (Application Programming Interface) is a computing interface that defines the interaction between multiple software intermediaries.

API key is a specific identifier use authenticate the developer user and call programs for the API.

The API keys often serve as a specific identifier and a secret token for authentication, and usually have a set of access rights to the API associated with it.

These are commonly used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.

Spyware is unwanted and often unsolicited messages. It is not technically malicious software, but can have a serious negative effect on IT infrastructures through sheer volume.

a. True
b. False

Answers

Answer:

The answer is "Option b".

Explanation:

The given statement is false because the spyware is a malicious program, that infects its device, and steals access to systems data from its web, and the spam also isn't technically malicious, but it could have a serious negative impact through density on the networks, and it is also junk message, which is web slang for an email message, which is primarily unsolicited email.

Which are Career and Technical Student Organizations? (Check all that apply.)

Answers

Answer: BPA (Business Professionals of America)

DECA (formerly Distributive Education Clubs of America)

Educators Rising.

FBLA-PBL (Future Business Leaders of America-Phi Beta Lambda)

FCCLA (Family, Career, and Community Leaders of America)

FFA (formerly Future Farmers of America)

Explanation: these are all i cant think of at the moment. sorry! but i hope this helps :)

The Careers and Technical Student Organizations are:

BPA DECA FBLA-PBLFCCLA FFA

What is a career?

A career is known to be the kind of work a person do for a living.

Note that  career can be a single job or a lot of jobs and it is one that is specific to a field.

Hence, the Careers and Technical Student Organizations are:

BPA DECA FBLA-PBLFCCLA FFA

See options below

Business Professionals of America

American Association of School Administrators

American Chemical Society

DECA

Future Business Leaders of America

FFA

SkillsUSA

FCCLA

Learn more about Career from

https://brainly.com/question/14864800

#SPJ2

To give text an outline, you can use which command?

Answers

Answer:

To show all text in an outline. Position the cursor the and then press

Alt + Shift + A

Explanation:

Which invention made mobile phones and tablet devices possible? 1 Decoder 2 Integrated circuitry 3 Microchip 4 Motherboard (I think mother bard but help please)

Answers

Answer:

The correct option is;

Integrated circuit

Explanation:

Following the invention of the transistor, the electrical wiring within an electronic device became known as the major factor contributing to the size of these devices and so in 1958 Jack Kilby and Noyce Fairchild independently developed the Integrated Circuit (IC) model which allowed the integration of the entire circuit onto a piece of solid material, making them smaller, faster, cheaper, more reliable to mass produce, made it possible for the development of smaller computers such as laptops and versions of similar technology, such as mobile phones and tablets due to the ease of standardization of ICs, leading to easier links from design to actual product of small communication devices that rely on ICs.

Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way as to render them unusable by unauthorized third parties?

a. Default allow
b. Separation of duties
c. File encryption
d. Fail-secure

Answers

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.

Answers

Answer:

They take a step-by-step approach to performing a task.

They break the task into manageable steps.

They identify the tasks that will repeat.

They can be written in a computer language to create a program for a computer to follow.

Explanation:

An algorithm is made up of a series of instructions that have a start point that eventually culminates in an endpoint. It is used in calculations and data processing. Some of the characteristics of algorithms include;

1. They take a step-by-step approach to performing a task. There are well-defined tasks that pass through a series of successive steps before the final culmination.

2. They break the task into manageable steps. There are definite manageable steps that tasks must be broken into to ensure successful execution.

3. They identify the tasks that will repeat and execute them when the program is reading.

4. They can be written in a computer language to create a program for a computer to follow.

Answer:

A). They take a step-by-step approach to performing a task.

C). They break the task into manageable steps.

D). They identify the tasks that will repeat.

E). They can be written in a computer language to create a program for a computer to follow.

Explanation:

I just did the Assignment on EDGE2022 and it's 200% correct!

How can I make my Wi-Fi signal fast? I am going through my exam but my Wi-Fi is not supporting plz help.

Answers

Answer: Maybe try to move router.

Explanation:

EXPLAINING A URL
URLs specify the location for resources on the Internet.
Examine the following URL and answer the following questions. In the following URL: www.example.com/homepage.html
What is the domain in this URL?
What is the path in this URL?
When this URL is typed into your browser, your browser generates a request based on the URL.
Where does this request get sent?
What kind of machine is listening for this request?
What exactly is the request asking for?
What does your browser expect to receive as a response?

Answers

Answer:

Explanation Below

Explanation:

The URL domain is example.

The URL path is the link itself

The Request gets sent to the web host.

The servers are the machine that gets the request (I’m not sure what you mean so I’m assuming it means that)

The request is asking the web host to connect you to the domain/server.

The last one I don’t really know......

Answer:

I hope this helps!

Explanation:

1. The domain in example.com

2. The path is /homepage.html

3. The request gets sent to the browser, which then sends it to the server.

4. The request is asking for the address that belongs to the server.

5. The browser expects to receive an HTTP response.

The first line in a Hypertext Markup Language (HTML) file is the _____, which is a processing instruction indicating the markup language used in a document.

Answers

Answer:

The appropriate answer will be "Doctype ".

Explanation:

Probably the DOCTYPE would not be a component or perhaps an HTML tag. It allows the app or developer to know how and where to view the text, by suggesting the HTML (and perhaps another XML language) edition or specification would be used. A document type specification, or DOCTYPE, seems to be a guideline associating a specific SGML as well as an XML document with either the concept of a document.

Which statement best describes what you would be aware of when you copy or move files from one place to another place?

Answers

Answer: The files are copied from the main folder or destination folder and pasted on another location or folder.

Explanation:

The files can be moved automatically from one folder to another. The files are then can be copied from one folder and pasted on another. The new file destination allows the automatic file renaming. The file can be erased or removed from the previous location. Copying a file is a means of content duplication.

What operating system does your computer use?What operating system does your computer use?

Answers

Explanation:

An operating system is simply software that abstracts the hardware allowing a computer user to access computer resources in a meaningful way.

The three main operating systems used by consumers are Windows, MacOS, and Linux.

Cheers.

An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs troubleshooting? PLEASE ANSWER FAST BECAUSE I AM AT THE TEST AND THESE ARE THE CHOICES. (a)core network (b)Demarcation point (c)Local loop (d)Wide Area Network (WAN) But it's not D because I tried it and it was wrong

Answers

Answer:

The answer is "Option c".

Explanation:

In the given-question, option c, that is "Local loop" is correct because it used to describe an actual connection line combines the two points, which starts from the starting point, and ends when the ending point for the communication carrier and the wrong choice can be defined as follows:

In option a, It's also known as the backbone network, that provides a network for all elements, that's why it is wrong.In option b, It is an extension, that's why it is wrong.In option d, It is used to cover the wide area, that's why it wrong.

Fixing a connection problem which is detected to be outside a carrier's regional office will require troubleshooting of the local loop.

Exploring the options given :

The core network covers the main or core portions of a telecommunication network which functions to provide pathways for the exchange and transmission of information between subnetworks and LANs. (Wrong).

The Demarcation Point simply means the point whereby a consumer's cable physically enters his building. It marks the point where the public network cable of a telecommunication company connects with the consumer's in-house connection or wire. (Wrong)

Local loop : These covers the area from the public communication company or service provider's office or grid up to the Demarcation point. Since the connection problem has been found to be outside the provider's regional office, then the local loop is the area which requires troubleshooting. (Correct).

Wide Area Network : Refers to a network coverage which spans over a large area. (Wrong).

Therefore, the most appropriate option is the local loop

Learn more : https://brainly.com/question/12021531?referrer=searchResults

In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?

Answers

Answer:

Internet Protocol refers to a set of rules that govern how data packets are transmitted over a network. Internet protocol describes how data packets move through a network. Its important to have agreed upon protocols because Computers make use of protocols as well, to enable them to communicate. Devices need to communicate. When two devices want to successfully communicate, they must agree to follow some rules about the way they will do it.

Answer:

Internet Protocols allows allows devices to connect and communicate on the Internet.It is important to have agreed upon protocols because it makes it possible for different network components to work together.

BRAINLIST PLS!

Which transmission media is faster? Fibre Optic or Radio-waves? I want full explanation!

Answers

Answer:

Due to the direct line of sight,the data rate of radio links is higher than that of fiber optic connections. A radio link has a lower latency (less delay).In contrast ,fiber optic connections may achieve higher bandwidths

what word matches with this
“Storage Device that contain all the
computer programs and documents”

Answers

Answer:

"Backup Drive"

Explanation:

"A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to?"

Answers

Answer:

Maintenance

Explanation:

The maintenance stage of an hardware life-cycle involves the servicing, repair replacement of machine component activities as well as other restorative activities meant to restore the machine to its original state.

The stages of an hardware life-cycle are;

1) Planning for the required hardware

2) Buying or leasing the hardware

3) Hardware installation

4) Maintenance activities, Repair

5) Hardware upgrading

6) Extend

7) Hardware trade in or buyback

8) Disposal of the hardware

Other Questions
Conjugate the present tense form of the verb "tener"nosotrosChoose...ellos/ellas / ustedesChoose...yoChoose... 4tChoose...vosotrosChoose....l i ella / ustedChoose.... Picture below for Question 7. Jim is training for a race. Jim ran 9.8 miles away from his home. Then, Jim ran 7.2 miles towards his home. Finally, Jim ran 4.6 miles away from his home. How far is Jim from his home? * -5(6x+3y-1)What is this simplified pls help!!!!!!!!! ASAP!!! A rectangle has a length of 5.50m and a width of 12.0m. What is the area of this rectangle? A medical class is hearing a lecture on vision. The doctor asks them what happens when the shape of the eye's lens changes, causing its elasticity to deteriorate. What condition is the doctor discussing? When a scientist analyzes experimental results, the scientist is Solve the following equation for x.3x-9=-33A.-16B.-8C.-9D-14 Blanchard talks about servant leadership, and Jim Collins talks about Level 5 executives. What do servant leaders and Level 5 executives have in common As the __________ substitute for low-skill labor becomes available, the demand curve for low-skill labor will shift to the left. Which of the following statements is false?O Mexico City is the financial center of Mexico.O Mexico City is the entertainment center of Mexico.o Mexico City has the lowest grime rate in Mexico.O Mexico City is the political capital of Mexico. Seller Patsy wants to net $150,000 from the sale of her home. She tells Broker Al that he can list the property for whatever price he wants and anything he gets above the $150,000 he can keep as his commission. What is this agreement called? IF DE = 3x+8, EF = 4x+6, and DF = 28, find the value of x. [In your solution,put x = YOUR ANSWER 6 Major events/discoveries by ancient Greece biology 1. Costs and benefits aren't always measured in dollars and cents. Assumeyour gym teacher just told you to "drop and give me 20!" You have alreadycompleted one set of 20 pushups. What non-money costs might youexperience if you give the gym teacher what she wants and do another set ofpushups? Answer this question in the form of one or more completesentences. christa spends 30% of her weekly income rent. if her rent is $360 each week, find her weekly income. Use the upper and lower sums to approximate the area of the region using the given number of subintervals (of equal width). (Round your answers to three decimal places.) y = 1 x2. Your friend decides to start a low-carbohydrate/high-protein diet. Describe to your friend how energy metabolism of carbohydrates will change and the impact it will have on weight loss/maintenance in the short-term and long-term. What is the best use of atomic model to explain the charge of particles and Thompson's beams?