two types of storage memory​

Answers

Answer 1

Answer:

Primary and Secondary memory

Primary memory includes ROM and RAM

Secondary memory includes CD, hard drive, etc


Related Questions

def rectangle_area(base,height):
area =base * height
return area


print("The area is ", rectanle_area(5,6))

ive been typing theabove in my answer but it still say "NOT QUITE"

Answers

Using the computer language in python to write a function code that calculates the area of ​​a rectangle.

Writting the code in python:

def rectangle_area(base, height):

z = base*height  # the area is base*height

print("The area is " + str(z))

rectangle_area(5,6)

See more about python at brainly.com/question/18502436

#SPJ1

Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Patricia. Janice thinks that what Abby is doing to Patricia is wrong, but she decides to log out of her account and ignore the cyberbullying. In this situation, Janice is a/an cyberbully. O advocate. O Internet troll. O bystander.​

Answers

Since Janice did ignore the cyberbullying, one can say that she is a  bystander.​

Who is a bystander?

The term connote a person that is said to be a nonparticipant spectator and in this case the person will do nothing even if someone is been killed in their presence.

Hence, Since Janice did ignore the cyberbullying, one can say that she is a  bystander.​

Learn more about bystander from

https://brainly.com/question/8516593

#SPJ1

In this situation, Janice is considered as a: D. bystander.

Who is a bystander?

A bystander can be defined as an individual that physically witnesses bullying or cyberbullying in digital forms such as social media, websites, and software applications.

In this context, we can infer and logically deduce that Janice is considered as a bystander because she witnessed how Abby said some awful things about Patricia.

Read more on bystander here: https://brainly.com/question/8516593

#SPJ1

what is the benefit of Agile?

Answers

Answer:

The benefits of algae is I also don't know .I as also going to ask thanks for point

solve the recurrence relation . x(n)=x(n/3)+n for n>1 ,x(1)=1

Answers

The solution to the recurrence relation is [tex]x(n) = \frac 12(3n - 1)[/tex]

How to solve the relation?

The relation is given as:

x(n) = x(n/3) + n for n > 1

x(1) = 1

Calculate x(3)

x(3) = x(3/3) + 3

This gives

x(3) = x(1) + 3

x(3) = 1 + 3 = 4

Calculate x(9)

x(9) = x(9/3) + 9

This gives

x(9) = x(3) + 9

x(9) = 4 + 9 = 13

So, we have:

x(1) = 1

x(3) = 4

x(9) = 13

The above sequence forms an arithmetic sequence.

An arithmetic sequence is represented as:

x(n) = x(1) + (n - 1) * d

Substitute 9 for n

x(9) = x(1) + (9 - 1) * d

Substitute 13 for x(9) and 1 for x(1)

13 = 1 + (9 - 1) * d

This gives

12 = 8d

Divide by 8

d = 1.5

Substitute d = 1.5 in x(n) = x(1) + (n - 1) * d

x(n) = x(1) + (n - 1) * 1.5

Substitute x(1) = 1

x(n) = 1 + (n - 1) * 1.5

Expand

x(n) = 1 + 1.5n - 1.5

Evaluate the like terms

x(n) = 1.5n - 0.5

Express as fraction

x(n) = 3n/2 - 1/2

Factor out 1/2

[tex]x(n) = \frac 12(3n - 1)[/tex]

Hence, the solution to the recurrence relation is [tex]x(n) = \frac 12(3n - 1)[/tex]

Read more about recurrence relation at:

https://brainly.com/question/4082048

#SPJ1

Convert 105 decimal to 128 binary form

Answers

Answer:

1101001 is binary 105

128 in binary is 10000000

What is cloud computing?

It is a way to store information on an independent server for access from any device.
It is a way for people to consolidate their social media presence to one website.
It is a way for users of social media to monitor the information they are making public.
It is a way to predict complicated weather patterns using the Internet and a series of satellites.

Answers

Cloud computing is a way to store information on an independent server for access from any device. Option A is the answer.

What is cloud computing?

Cloud computing helps to stores information in a secure serve.

It makes use of internet to store information and it can be for a long time.

Therefore, Cloud computing is a way to store information on an independent server for access from any device.

Learn more on cloud computing below

https://brainly.com/question/19057393

#SPJ1

when you use the predict step in the IPDE process you

Answers

If a person use the predict step in the IPDE process, you  are known to judge where possible points of conflict any take place.

Why using the IPDE process?

This is known to be Identify, Predict, Decide, and Execute.

The IPDE is regarded as a strategy that a person can make use of in off-road driving and as such, If a person use the predict step in the IPDE process, you  are known to judge where possible points of conflict any take place.

Learn more about IPDE from

https://brainly.com/question/2497669

#SPJ1

Which of the following should you do when accepting constructive criticism? (choose all that apply)
right: show a positive facial expression
right: maintain eye contact
wrong: interrupt and question the person frequently
right: do not interrupt or speak until you are sure the other person is finished making a point
wrong: cross your arms in front of your chest

I couldnt find the answer on brainly so i putted as a question for who needs it on brainly.

Answers

Maintain eye contact, maintain a cheerful facial expression, and wait to talk until the other person has completed delivering their argument.

Which of the following terms best encapsulates the moral standards that guide an individual's or a group's actions?

Introduction: The moral principles that direct a person's behaviour are known as ethics. Everyday decisions on how to respond to events, both personal and professional, are influenced by our sense of ethics.

What exactly does work ethics entail?

Work ethic is a principle based on diligence and hard labour. It also involves a conviction that work has moral value and can develop good character. The Protestant commitment to hard work is one instance. A work ethic could include of  being reliable, having initiative, or pursuing new skills.

To know more about delivering visit:-

https://brainly.com/question/30645383

#SPJ1

Consider a student who has the choice to buy or not buy a textbook for a course. We’ll model this as a decision problem with one Boolean decision node, B, indicating whether the agent chooses to buy the book, and two Boolean chance nodes, M, indicating whether the student has mastered the material in the book, and P , indicating whether the student passes the course. Of course, there is also a utility node, U. A certain student, Sam, has an additive utility function: 0 for not buying the book and -$100 for buying it; and $2000 for passing the course and 0 for not passing. Sam’s conditional probability estimates are as follows:
P(p|b,m) = 0.9 P(m|b) = 0.9 P (p|b, ¬m) = 0.5 P (m|¬b) = 0.7 P (p|¬b, m) = 0.8 P (p|¬b, ¬m) = 0.3
You might think that P would be independent of B given M, But this course has an open- book final—so having the book helps.
a. Draw the decision network for this problem. b. Compute the expected utility of buying the book and of not buying it.
c. What should Sam do?

Answers

Explanation:

draw the decision network for this problem

If following the 180-degree rule when filming, once an imaginary 180-degree line (the axis of action) has been established, which of the following is TRUE:

A. The axis of action must never shift over the course of the scene

B. The camera may be moved to either side of the line, as long as the main subject remains on the left side of the screen

C. The camera will be placed on one side (this side) of the line only

D. The camera is then free to move up or down 180 degrees on either side of the line

Answers

If following the 180-degree rule when filming, option c: The camera will be placed on one side (this side) of the line only.

What is the 180 rule in cinematography?

The 180-degree rule in cinematography is one that connote that  a camera need to stay on one side of any form of  imaginary line that exist between characters to keep visual consistency.

Hence, If following the 180-degree rule when filming, option c: The camera will be placed on one side (this side) of the line only.

Learn more about filming from

https://brainly.com/question/26276466

#SPJ1

What is referential integrity

Answers

The association between tables is referred to as referential integrity. A primary key is required for each table in a database and can appear in other tables as a result of its connection to the data in those other tables. Foreign keys are used when a primary key from one table appears in another table.

Write a while loop that prints user_num divided by 2 until user_num is less than 1

Answers

Explanation:

The required function in python is written as follows :

user_num = int(input())

#takes an input value and convert to an integer value.

while user_num >= 1 :

#While loops is conditioned to run if user_num is ≥ 1

user_ num = user_num / 2

#divide user_num by 2 and store the result as user_num

print(user_num)

#print user_num

The while loop condition does most of the work here, The while loops is conditioned to run the divison of user_num if the value of user_num is greater than or equal to 1 ; if user_num is lesser than 1, the loop terminates.

Lear more : brainly.com/question/15170131

laminiaduo7 and 9 more users found this answer helpful

THANKS

1

1.5

(8 votes)

Unlocked badge showing two hands making the shape of heart over a pink circle

Found this answer helpful? Say thanks and unlock a badge.

Advertisement

Answer

author link

teobguan2019

Ambitious

613 answers

1.2M people helped

Answer:

user_num = float(input("Enter a number: "))

while(user_num > 1):

user_num = user_num / 2

print(user_num)

Explanation:

Line 1:

Use built-in function input() to prompt user input a number and assign it to the variable user_num.

Since the default data type of the user input is a string, we need to convert it into float data type before assigning it to user_num. We can do the data type conversion by enclosing the user input into the built-in function float().

Line 3:

Create a while loop by setting condition while user_num bigger than 1, the line 4 & 5 should keep running.

Line 4:

Divide user_num by 2 and assign the division result back to the user_num.

Line 5:

Display updated value of user_num using built-in function print()

Assume that x ransomware is currently pandemic. Explain your way to protect your systems (PCs or servers) from x ransomware without service interruption

Answers

Let's check the precautions

Use MFA

MFA stands for multi factor authenticationThis is the complicated edition of general two step authentications we do on regular basis

Use strong passwords

Never use 1234.. or any easy passwords like your name,no etc

Always patch early

Try to patch on rare basis

Use VPN

Turn off your RDP if you don't need right then

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

Think back to your early days of education—what role did technology play? Now ask a parent/guardian/older family member what role technology played in their education. Discuss the difference between your experience and this older family member’s experience with technology in education. Which do you think created a better learning experience?

Answers

The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Note that schools were said to slowly create a curriculum where the subjects which are seen as most vital were taught.

By the mid-1600s, the invention of the modern library and the pencil were brought up, starting the first et of educational technology.

How has technology played a role in education?

It is one that has helped a lot of students to be able to look out or search for new subjects and broaden their understanding of a lot of hard concepts, such as STEM.

Note that The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Learn more about technology from

https://brainly.com/question/25110079

#SPJ1

I need help with my work

Answers

Answer:

totally

awesome

Explanation:

You can evaluate the expressions in the statements by hand:

if (a*b!=c) evaluates to

if (2*3 != 11)

if (6 != 11)

if (true)

so the next line is executed (it prints 'totally')

Likewise, the other if statement also evaluates to true.

by default which service accounts will windows powershell cmdlets manage

Answers

By default, the service accounts which Windows PowerShell cmdlets will manage are group MSAs.

What is a cmdlet?

A cmdlet is abbreviation for command let and it can be defined as a lightweight and native PowerShell command that is designed and developed to be used by an administrator (end user) within the PowerShell environment of a Windows computer system.

In Computer technology, the PowerShell runtime is saddled with the responsibility of invoking these Windows PowerShell cmdlets based on the automation scripts that are provided by an administrator (end user) at the command line.

In this context, we can infer and logically deduce that by default, the service accounts which Windows PowerShell cmdlets will manage are group MSAs.

Read more on PowerShell cmdlets here: https://brainly.com/question/10674913

#SPJ1

When using sftp to share files, what is encrypted in addition to the authentification information?.

Answers

In addition to the authentification information, the data files are encrypted when using SFTP to share files.

What is SFTP?

SFTP is an abbreviation for SSH File Transfer Protocol and it can be defined as a type of secured file transfer protocol that's designed and developed to run over the SSH protocol by supporting full security and authentication, file management, as well as sharing files between two or more users on an active computer network.

This ultimately implies that, SSH File Transfer Protocol can be used for file management, file transfer and provide end users with full security and authenticated file access.

In conclusion, we can infer and logically deduce that in addition to the authentification information, the data files are encrypted when using SSH File Transfer Protocol (SFTP) to share files.

Read more on file transfer here: brainly.com/question/20602197

#SPJ1

Which factor has not aided the success of some social networking sites?

Answers

Answer:

Explanation:Comunicarse en la era 2.0, es la forma más sencilla que ha tenido el proceso, sobre todo por los diversos canales que tienen las personas para hacerlo en la actualidad. Sin embargo, la comunicación digital va más allá de estar en contacto con otras personas, principalmente porque ahora, socializar se ha convertido en una función más profunda y cercana a dicha actividad.

Y es que, con las redes sociales, estar en contacto unos a otros es, sin lugar a dudas, un proceso sumamente fácil, instantáneo y entretenido, porque gracias a ellas, podemos saber qué hacen los demás en el momento en qué sucede, y palpar sus reacciones, sin necesidad de estar cerca de ellos. Sin embargo, hay cosas que se deben tomar en cuenta al instante de gestionar las mencionadas comunicaciones.

Realidad

En las redes sociales, la popularidad es algo que todos quieren, y la descubren a través de la cantidad de “likes” o comentarios que tengan sus publicaciones. Sin embargo, las personas quieren ver otras personas, reales y genuinas, y no personajes irreales y viciados de credibilidad. ¡No finjas ser quién no eres!

Variedad

A todos les gusta ver cosas distintas cada día. ¡Lo cotidiano aburre, lo sabemos! Por eso, es bueno compartir contenido diferente, pero además, evitar sobresaturar los perfiles de la misma información, o fotografías.

Seguridad

Este punto es sumamente importante para el dueño de la red, porque de él depende su privacidad. Hay que evitar compartir información muy personal, y que pueda poner en riesgo su propia estabilidad.

En fin, todos ahora quieren estar inmerso en la nueva forma de comunicación del siglo XXI, pero la mayoría omite lo anterior. Por ello, en Florida Global University (FGU) le enseñamos cómo hacerlo, a través de nuestra Licenciatura en Periodismo Digital, especializada en la Gestión de Comunicaciones Digitales, donde aprenderá a realizar un manejo exitoso, ¡Y a ser periodista digital, claro está!

Type the program's output: weight_oz = 8.25 print('The steak weighs {:.2f} oz'.format(weight_oz))

Answers

The steak weighs 8.25 oz

Program's output

weight_oz = 8.25

#The above assigned a value of 8.25 to the variable, weight_oz

print('The steak weighs {:.2f} oz'.format(weight_oz))

#This displays the strings 'The steak weighs' and the value of the variable, weight_oz, but in a formatted form. The limit is the first 2 digits after the decimal point.

More on programming outputs can be found here: https://brainly.com/question/18079696

#SPJ1

You are given a list of N integers . find the largest sum of a continuous sequence from the given list

Answers

Explanation:

di5ditdi5suufsutydskydjgsukstralurilttdljstp7hzpgxuptdoyd

Careers and information technology deal with

Answers

Answer:

computers and telecommunications

Explanation:

Write the SQL commands to obtain the following information from the system catalog:

List every table that you created.
List every field in the Client table and its associated data type.
List every table that contains a field named TaskID.

Answers

The SQL commands to obtain the information from the system catalog is illustrated below.

How to illustrate the the SQL commands?

It should be noted that SQL commands are instructions to communicate with a database to perform a task.

List every table that you created. - SHOW TABLES

List every field in the Client table and its associated data type. - SHOW COLUMNS FROM CUSTOMER

List every table that contains a field named TaskID. - SELECT TBNAME FROM SYSCOLUMNS WHERE COLNAME = 'TaskID'

Learn more about SQL on:

brainly.com/question/25694408

#SPJ1

What does it mean when someone says your voice doesn’t match how u look

Answers

Explanation:

it means that your voice it doesn't match with your personality like 2 characteristics by voice and by personality

ABC company have lots of computer running window 7. But they are not thinking to upgrade a higher version of window. One of the staff suggested to install CHROME OS Flex and use android app for different purposes. Please state and explain 3 kinds of threats for the above suggestions

Answers

First threat

It's malwareBecause chrome OS is not much secure as compare to windows 11 (Prime opponent)

2nd threat

It's speedChrome OS is litreally very slow .On comparing to windows edition it lacks in multiple factor so you work per unit tike decreases

Third threat

You may be able to use Android apps but windows is made for ComputersIn several factors like ads,cleanness chrome OS will create problems

dentify the benefits of workplace diversity. Select all that apply.

The Americans with Disabilities Act (ADA) is a federal law that states employers must do which of the following for workers with disabilities?
right: provide reasonable job accommodations
wrong: hire disabled workers
wrong: make job accommodations no matter the cost

Im asking a question cuz i couldnt find the answer in brainly. for anyone who needs it

Answers

Answer:

A is the answer

Explanation:

Because I just did it.

Have a good day.

Write code that declares variables to represent a user’s hourly rate of pay and the
number of hours worked.
Assign appropriate values to the variables, then calculate and display the user’s gross
pay for a week, the withholding tax (15% of gross pay), and the net pay (gross pay –
withholding). An example output would be:
Gross Pay: 1500
Withholding Tax: 225
Net Pay: 1275

c# language

Answers

The code for the given command is:

hrs = input("Enter Hours:")

h = float(hrs)

ret = input("Enter rate per hour:")

rate = float(ret)

p = computepay(h, rate)

print("Pay", p)

The above code asks the user for input of hourly pay rate and the number of hours worked and prints the output after making the necessary computations.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture

Answers

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

How does SaaS (Software as a service) impact organizational security posture?

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

What is organization level security in Salesforce?

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

https://brainly.com/question/24852211

#SPJ1

Type the correct answer in the box. Spell all words correctly.
Which professional American organization for designers has set up many standards and guidelines that its members have to follow?

Answers

The professional American organization for designers has set up many standards and guidelines that its members have to follow is known as ANSI.

What mean ANSI?

The American National Standards Institute (ANSI) is known to be a kind of private, non-profit organization that gives or coordinates the U.S. voluntary standards and the conformity in terms of assessment system.

Hence, The professional American organization for designers has set up many standards and guidelines that its members have to follow is known as ANSI.

Learn more about American organization from

https://brainly.com/question/19334871

#SPJ1

Answer: Institute of Graphic Arts

Explanation:

The American Institute of Graphic Arts (AIGA) is a professional membership organization for designers. 

AIGA has set up many standards and guidelines that its members have to follow. 

These standards may be ethical, professional, or even legal.

(Plato)

what is the importance of Microsoft word in our everyday lives?​

Answers

Answer:

Allows us to create business documents.Helps to design and create cards, brochures, new letters etc. for business.Benefits teachers and students in developing innovative teaching and learning methods.Microsoft word is an important application for the purpose of education.It also helps in making notes instead of using notebooks.Ms Word also helps in making notes having graphs, charts, diagrams, tables etc.
Other Questions
resonance frq. of a 50 mico henries and a 40 pico farad capacitor DISCUSS FEATURES OF ARTHROPODS RESPONSIBLE FOR THEIR PHENOMENAL SUCCESS ON EARTH. write equations showing how each weak base ionizes water to form oh-. also write the corresponding expression for kb. a stock currently sells for $51. the dividend yield is 2.9 percent and the dividend growth rate is 4.2 percent. what is the amount of the dividend that was just paid? A cylindrical pressure vessel is subjected to a normal force F and a torque. P = 80 psi F=500lb T=70 lb. ft t=0.1 in din = 4in Oyp = 30ksi Will the material fail under Tresca's yielding criterion ? 2.67 which is a bond-line drawing of (ch3)2chch2oc(ch3)3? consider the following parametric equation. x = 11(\cos \theta \theta \sin \theta) y = 11(\sin \theta - \theta \cos \theta) what is the length of the curve for \theta= 0 to \theta= \frac{7}{2} \pi? Write an explicit formula for the sequence 8,6,4,2,0,..., then find a14.a. an=2n+10;16b. an=2n+8;18c. an=2n+8;20d. an=2n+10;18 Let G = (V,E) be an undirected graph with n 2 nodes and let u,v be any two vertices in V. Prove that G has some orientation that is a DAG in which u is a source and v is a sink. evaluate r1625x2y2 da where {(x,y) x2 y216,x0,y0} by converting to polar coordinates. what can you conclude about the colors that your eyes can perceive and the energy absorved by the colored solutions? use your knowledge of the wavelength measurements for each color and the energy calculations to back up your statements. A gasoline engine operates steadily on a mixture of isooctane and air. The air and fuel enter the engine at 25C. The fuel consumption is 3.0 g/s. The output of the engine is 50 kW. The temperature of the combustion products in the exhaust manifold is 660 K. At this temperature, an analysis of the combustion products yields the following values on a dry volumetric basis): CO2, 11.4%; 02, 1.6%; CO, 2.9%; N2, 84.1%. Find the composition in moles (number of moles per mole of isooctane) of the reactants and the reaction products. In the MIPS micro-architecture, the PC is incremented for each instruction, during the "Instruction Fetch" stage. The value of the PC may also be updated later within the "Memory Access" phase. If the value of the PC is: 0x0000 2F1C, what is the value of the PC after you complete the execution of the instruction: ``addi $t0, $s0, $ra``? binding of neurotransmitter by secondary neurons results in propagation of nerve signal through the various olfactory pathways. true or false Two inbred varieties of butternut squash are bred and the progeny are then self-fertilized. The mean length and variance of squash size for each generation is shown below. The growth conditions were kept the same in each generation. Mean Length (em) Variance (cm) Parenti 40 Parent II 90 F1 65 F2 65 49 49.4 45 32. What is the environmental variance (in cm)? A) 0 B) 2 C) 4 D) 5 E) 7 20. Which relations in Exercise 5 are asymmetric? 21. Which relations in Exercise 6 are asymmetric? Which of the following statements is true about the preparation of the government-wide financial statements?A) Government-wide financial statements are separated into governmental, business-type, and fiduciary activities.B) The activities of all component units are presented in a separate column in the Statement of Net Assets.C) Information for governmental fund financial statements and enterprise fund financial statements serve as inputs to the government-wide financial statements; both require adjustment to the accrual basis.D) Internal service funds typically are reported in the governmental activities sections of the government-wide financial statements.E) none of the above the orbits of comets in our solar system are much more eccentric than planet earth, which revolves around the sun following a relatively circular path. contrast the education opportunities available for white children and african american children in the north while educational reform was going on? The difference in cell wall structure of Mycobacterium and Nocardia compared to the typical gram-positive bacterial cell wall structure is that they ________.