what is memory?
How many type of memory in computer system?​

Answers

Answer 1
What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend


Related Questions

computer generation types​

Answers

Answer:

First generation 1940s-1950s Vacuum tube based

Second generation 1950s-1960s Transistor based

Third generation 1960s-1970s Integrated circuit based

Fourth generation 1970s-present Microprocessor based

Fifth generation The present and the future Artificial intelligence based

anyone help me please​

Answers

Answer:

1. True

2. False

3. True

4. False

5. True

6. True

7. False

Explanation:

2. False

Anyone can use internet.

4. False

Assured and speedy delivery of goods is possible with the help of speed post service.

7. False

www stands for World Wide Web

Hope it is helpful....

hello, would you like to be my friend?

can i please get your intro?

Myself Ojasvi

Class 8, 13

India

list out the storage measurements units of a computer .

Answers

Answer:

Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million byte

Answer:

Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million bytes.

what happen if ignore the unsafe markings in hand tools in ict​

Answers

Answer:

Getting it right will not only protect employees and visitors from harm, it will also help to create a safe, productive workplace and mean that businesses can avoid any unnecessary financial loss.

Convert alzebric expression into basic expression
(1/2)bh
PLEASE GIVE ANSWER FAST

Answers

Answer:

(1/2)*b*h I guess I don't know a lot about qbasic

explain the working principle of computer by describing its basic operation​

Answers

Explanation:

The working principal of the computer system. Computers do the work primarily in the machine and we can not see, a control centre that converts the information data input. A computer is a machine made up of parts for the hardware and software.

What are the function of PowerPoint?
10 points please ​

Answers

PowerPoint is a presentation program that allows you to create dynamic slide presentations. These presentations can include animation, narration, images, videos, and much more.

hope this helps <3

Answer:

Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.

It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.

Explanation:

Hope this helps! Thanks.

Which of the following electronic collaboration techniques is the best
for immediate feedback?
A. E-mail
B. Collaborative workspaces
C. Video conferencing
D. Project management software

Answers

Answer:

D. project management software

Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propagation speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.

Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms

Answers

Answer:

please mark me brainlist

Explanation:


Identify the names of the following:

Please help me.​

Answers

Hi,

1st photo is Printer

2nd photo is Hard Disk

3rd photo is Printer's internal CPU

Hope it helps you... pls mark brainliest if it helps you

Mark true or false IT questions

1:you can change the default font style in word ( )

2:A pie chart represent only one data series ( )

3:MS-DOS is a graphical user interface operating system ( )

4:a presentation software is a application software ( )

5: only addition can be done in the ALU ( )

fill in the blanks...............

1:A ................... mouse is looking like a pencil

2:A/An ......................... is an interface between the user and the computer​

underline the correct answer

1: the.......... function multiple the numbers in Excel

add

sum

products

Min

2:to enter the data in multiple lines

wrap text

merge and center

orientation

all of these

3:a list is used when the unordered of items is marked

bulleted

numbered

both a and b

non of these

4:the screen that you see after you signed in the computer

wallpaper

desktop

screen saver

non of these

5:the ............. manages the working and control of a network device

Device driver

kernel

file system

all of these

Answers

Answer:

1. true

2. true

3. false

4. false

5. false

You replaced the ink cartridges in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are starting or stopping before they should. Which inkjet maintenance task do you need to perform

Answers

You need to perform print cartridge calibration.

computer that process digital as well as analogue signals​

Answers

Answer:

Hybrid Computer is the computer that process digital as well as analogue signals.

what do you understand by cloud computing? list the advantages of clould computing. ​

Answers

Answer:

cloud computing is the on demand availability of computer system resources and specially data storage and without direct active management by the user.

the advantages are ;

business countunuity

acess to automatic updates

scalability

collaboration efficiency

A program that is used to view websites is called a​

Answers

Explanation:

A web browser is a type of software that allows you to find and view websites on the Internet

A program that is used to view websites is called a ​browser. The correct option is c.

What is a web browser?

An application program known as a browser offers a way to see and engage with all of the content on the World Wide Web. Web pages, movies, and photos are included in this.

Anywhere on the internet is accessible with a web browser. It pulls data from other websites and displays it on your computer or mobile device. The Hypertext Send Protocol, which outlines how text, pictures, and video are communicated on the web, is used to transfer the information.

The term "web browser," sometimes known as a "browser," refers to a program used to access and view web pages. There are different types of browsers available on devices.

Therefore, the correct option is c. browser.

To learn more about web browsers, refer to the link:

https://brainly.com/question/28504444

#SPJ6

The question is incomplete. Your most probably complete question is given below:

word processor, spreadsheet, browser, web viewer, the viewer.

In a cellular network, each cell is controlled by a tower. What are these towers called?
Question 46 options:

1)

Magic gates

2)

Base stations

3)

Base controllers

4)

Ethernet hubs

Answers

Answer:

all of the above

Explanation:

A_____ socket has blunt pins that project up to connect with pads on the bottom of the
processor
Q 1) staggered pin grid array (SPGA)
2) land grid array (LGA)
3) pin grid array (PGA)
4) ball grid array (BGA)

Answers

Answer:

option 4 ( ball grid array)

I need help with my computer, I did a network reset because my wifi was acting up and I was told to do so, but now I can't connect to any network

Answers

Answer:

Turn off your netork, restart your computer and turn on the network back again,

if that doesn't works, try contacting a technician

Answer:

The best solution is to uninstall the network adapter's driver and allow Windows to reinstall it automatically. ... Press Windows key + X and click on Device Manager. Right-click on the network adapter and choose Uninstall. If prompted, click on Delete the driver software for this device.

What can be done to create new jobs in an economy where workers are increasingly being replaced by machines?

Answers

Answer:

Remove some machine by only giving the machines the works humans can not do and the ones humans can do should not be replaced by robots

plz help me I need help​

Answers

Answer:

ok i will help you

you can asked

a force from water that brings water to your house​

Answers

Answer:

hydroenergy hope that will help you in the future

diffreciate between primary source of information and secondary source of information​

Answers

Answer:

Primary is firsthand, secondary is viewed through articles and other materials.

Explanation:

EX: Primary account of a story, secondary view through pictures.

is a standard naming system for OS and applications software. A fingerprinting tool such as nmap will try to match the software running on a host to a CPE identifier by analyzing responses to network probes.

Answers

Answer:

Explanation:

Sure, I guess.

Rebecca is designing an in-store display to promote a new board game, which is packaged in orange. What would be the most effective color to use for the display background

Answers

Answer:

...

Explanation:

Unless this is a multiple-choice question, then by using the standard defintion of "orange" (not "yellow orange" or "sunburnt orange"), my answer would be blue, white, black, purple, and sometimes even brown.

1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United

Answers

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.

The rule for variable declaration:

The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

pls help with this two.

Answers

Answer:

I love my *country ** so i am going visit it

Answer:

I also like my country very much

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

Which engineer may design a GPS for a vehicle?

Answers

Explanation:

Mechanical engineer may design a gps for a vehicle.

the term that refers to the methods and equipment used to gather, process, communicate and store information is​

Answers

Answer:

information technolocy or IT

How can the Playback feature adjust your audio recording?

Answers

Answer:

If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.

Explanation:

Other Questions
The principle of do no harm or __________ is a primary moral consideration when addressing reproductive technologies. M U N = { 7,8,9,10,11,12,} and M = {7,8,10} then which of the following represent set N Since bacteria need moisture to thrive, what are some examples of dry foods that rarely have an infestation of bacteria unless moisture is added? list 3 The surface area of a cone with radius r units and slant height s units is shown below: Surface area = 3.14(rs + 2) Part A: Ifr= 6 units and s = 4 units, write an expression that can be used to calculate the surface area of the cone. (4 points) Part B: What is the surface area of the cone? Show your work. (6 points) The diagram shows a simplified version of how the blood moves around the body of an animal. Is the blood at point D oxygenated or deoxygenated? Ying is a professional deep water free diver.His altitude (in meters relative to sea level), xxx seconds after diving, is modeled by:D(x)=\dfrac{1}{36}(x-60)^2-100D(x)= 361 (x60) 2 100D, left parenthesis, x, right parenthesis, equals, start fraction, 1, divided by, 36, end fraction, left parenthesis, x, minus, 60, right parenthesis, squared, minus, 100What is the lowest altitude Ying will reach? Who used the Mississippi river to transport goods?A) piratesB) missionariesC) fur tradersD) farmers Giving brainliest to the correct answerRead this passage from Barrio Boy. Then answer the questions.I realized that this was our own electric light for us to turn on and off as we pleased. I pushed a chair under it and after some instruction from my mother proceeded to create lightning in the room by turning the switch as fast as I could.Barrio Boy,Ernesto GalarzaWhich of these events comes first in the passage?Which of these events comes last in the passage? which of the following could be the side length of the right triangle Help!! Truth Table Thank you!! please help this one doesnt nee and explantion How are edge cities formed and how are they beneficial/detrimental? 5. A proposed set of statements or principles used to explain a group of facts or natural phenomena is a law question set of data conclusiontheory What happened when Steve Jobs turned 30? ( How to live Before You Die) Question 1 (Worth 2 points)Which of the following describes physical features on Earth that form political divisions? Natural boundaries Human-made borders Only oceans and rivers Only mountain rangesQuestion Information: Rationale: As the name suggests, a natural boundary is any physical feature on Earth like a lake, river, or even mountain range that is used to divide political areas.Points earned on this question: 2Question 2 (Worth 2 points)The only U.S. state to call its political subdivisions "parishes" is Minnesota Alaska Pennsylvania LouisianaQuestion Information: Rationale: Remember the trivia challenge? Louisiana is the only state to call its divisions parishes instead of counties.Points earned on this question: 2Question 3 (Worth 2 points)We can map information contained in GUS GAS GPS GISQuestion Information: Rationale: Its all mapped out. A GIS or Global Information System can give us a set of descriptive or scientific data for a place.Points earned on this question: 0Question 4 (Worth 2 points)A GPS device can tell you how many trees are in an area the location of a specific point where to buy a more detailed map how long you have been somewhereQuestion Information: Rationale: Where am I? GPS stands for Global Positioning System. A GPS can locate a precise location, which is exactly what makes them so useful when youre lost.Points earned on this question: 2Question 5 (Worth 2 points)Which of the following nations has the most political divisions within it? United States Dominican Republic Mexico CanadaQuestion Information: Rationale: The most divided. A political map shows divisions between countries and also within a country. From the choices listed, the United States contains the most divisions since it has 50 states.Points earned on this question: 0Question 6 (Worth 2 points)What type of border would likely have the most protection? State Province National CityQuestion Information: Rationale: Protect the border. A large national border would typically have more protection than a smaller state, province or city border.Points earned on this question: 2 Prohibition had which of the following unintended consequences? a hurricane that is rated category 5 would have which of the characteristics below?A winds of 119-153 miles per an hour with little to no damage to structersB winds of 154-177 miles per an hour with some damage to roofs doors or windowsC winds of 178-209 miles per hour with damage to homes D winds of 251 miles per hour or higher with complete roof failure and possible complete structure failure Explain how fibrin protects the body In terms of vesicle docking, which of the following events has to happen before all the others can happen?a. Rab binds GTPb. V-SNARE binds T-SNAREc. NSF mediates dissociation of SNARE complexd. Rab binds to tether protein How is the year 2019 written as a Roman Numeral? Standard Number Roman Numeral 1 V 1 5 10 50 100 500 1,000 C D M A) MMXIX B) MMXVIII )