The storage device which is not usually used as secondary storage is 1 point a) Semiconductor Memory b) Magnetic Disks c) Magnetic Drums d) Magnetic Tapes

Answers

Answer 1

Answer:

a) Semiconductor Memory

Explanation:

A primary storage device is a medium that holds memory for short periods of time while a computer is running

Semiconductor devices are preferred as primary memory.

ROM, PROM, EPROM, EEPROM, SRAM, DRAM are semiconductor (primary) memories.


Related Questions

03.05 Editing in Word
1335 Middle School Business Keyboarding / Module 03: Write with Word
1. (03.05 LC)
This tool allows you to duplicate text from one part of a document while keeping the original text. (5 points)
O Cut
O Copy
O Drag
o paste

Answers

Answer:

Copy

Explanation:

In Microsoft Word, the copy tool is located in the Home tab, within the Clipboard group along with Cut, Paste, and Format Painter tool buttons

The Copy tool can also be brought up by right clicking a selected item

The Copy tool is activated when an item is selected. When the Copy tool command is used, the text is copied while keeping the original text.

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

when can one say that certain product has value​

Answers

Answer:

We can say that a certain product has a value when it is sold on Market and if many people demands on it. Products are produced to satisfy our needs and wants.

Explanation:

thank me later

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

What is the first phase of game development?
OA
the concept phase
B.
the pre-production phase
O c.
the prototype phase
D.
the alpha phase
E.
the beta phase

Answers

Hello there! The answer is:

B. The Pre-Production Phase

When someone or a group of people are designing an app or game, they generally follow the rule of phases. Basically, if you don't know what this process is, sound effects, character designs, icons and the concept are discussed. This is the first phase of game development.

I hope I helped you!

pls help
urgent questions please​

Answers

Answer:

1 - CLI

2- GUI

3-CLI

4- CLI

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next

Answers

Answer:

Obviously update the router

Explanation:

Keeping your router up to date is also a really important thing to do to protect your network from vulnerabilities. Outdated systems are easy targets for new methods of hacking.

what is processing for a computer?​

Answers

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

PLEASE HELP !!!! 40 POINTS BUT HELP

Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]

Answers

Answer:

So in a way it is about a python calculation

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

Which benefit of purchased data models provides database planning and analysis by providing a first data model, which we can use to generate specific analysis questions and concrete, not hypothetical or abstract, examples of what might be in the appropriate database

Answers

Answer:

It facilitates systems analysis.

Explanation:

Systems analysis can be described as a process of gathering and interpreting data, finding faults, and breaking down a system into its constituent parts. It is a problem-solving strategy that facilitates an improvement in the system and guarantees that all of the system's components work together in an efficient manner to achieve their goals.

Therefore, the benefit is that it facilitates systems analysis.

What do you call a collection of pre-programmed commands and functions used in programs?
Choices
1.Widget
2.Function
3.Libary
4.Variable

Answers

The answer is number 3.libary

What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

Explanation:

Required

[tex]1001011_2 + 100011_2 = []_{16}[/tex]

First, carry out the addition in binary

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

The step is as follows (start adding from right to left):

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

[tex]1 + 1 + 1(carry) = 11[/tex] ---- Write 1 carry 1

[tex]0 + 0 + 1(carry) = 1[/tex] ---- Write 1

[tex]1 + 0 = 1[/tex] --- Write 1

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

Next, convert [tex]1101110_2[/tex] to base 10 using product rule

[tex]1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0[/tex]

[tex]1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0[/tex]

[tex]1101110_2 = 110_{10}[/tex]

Lastly, convert [tex]110_{10}[/tex] to hexadecimal using division and remainder rule

[tex]110/16 \to 6\ R\ 14[/tex]

[tex]6/16 \to 0\ R\ 6[/tex]

Write the remainder from bottom to top;

[tex]110_{10} = 6(14)_{hex}[/tex]

In hexadecimal

[tex]14 \to E[/tex]

So, we have:

[tex]110_{10} = 6E_{hex}[/tex]

Hence:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B. Interactivity C. Management plan D. Business analysis​

Answers

Answer:

Management plan

Explanation:

What do you use the Pygame library for?

Answers

Answer:

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.

A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an

Answers

Answer:

algorithm

Explanation:

A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an algorithm.

What is algorithm?

An algorithm is a method for performing calculations or finding solutions to issues. Algorithms perform as a precise set of instructions that carry out preset activities consecutively in either hardware-based or software-based routines. Algorithms play a big role in information technology across the board.

Algorithms can be found in a variety of contexts, including the way we do laundry, how we answer long division problems, what goes into baking a cake, and how search engines work.

The merge sort algorithm is one of the most important ones now in use. It is a comparison-based sorting algorithm that uses the divide-and-conquer tactic to get over an challenge. It was made by John the mathematician.

Thus, it is an algorithm.

For more information about algorithm, click here:

https://brainly.com/question/22984934

#SPJ6

PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE ​

Answers

Answer:

3

Explanation:

Answer:

Correct answer is C: Format Check

One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.

Answers

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

What space is space surrounding the area around the main subject.

Answers

Answer:

Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.

Explanation:

- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.

who invented the Bluetooth device​

Answers

Answer:

The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.

Explanation:

according to this website www.androidauthority.com/history-bluetooth-explained-846345/

Answer:

alexander - edg 2022

Explanation:

When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward. Select one: Red Flashing Lights Red X Warning Bell Warning Page

Answers

Answer:

the last option

warning page

Data inconsistency is described as A. Lack of data sharing between DBMS and Data Warehouse B. Program data dependence C. Having duplicate data in multiple files D. Lack of data sharing between similar DBMS E. Different versions of the same data appear in different places

Answers

Answer:

Having Duplicate Data in Seperate Files

Explanation:

A conflicting data set happens when managerial changes to a data set in the exchange log disagree with data kept up in the data set's setup document. A DBMS is a way this can be forestalled. I hope I helped you!

What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard

Answers

Answer:

private

Explanation:

who likes video games

Answers

i wish i could play but my strict mom would never let me :’(

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

Other Questions
A 46.0 g golf ball is travelling with a velocity of 5.10 m/s. What is the kinetic energy of the golf ball Saima can blow 15balloons in 20 min sara can blow 18 balloons in 25 minutes ahamd can blow 16 balloons in 21 minutes bilal can blow 12 ballons in 23 min who can blow balloons at fastest rate Victoria is designing an image to be projected onto a screen. Her design is shownbelow.Victoria's DesignWhat is the total area, in square centimeters,of Victoria's design?8 cm4 cm4 cm4 cm10 cm14 cm146 centimeters squared188 centimeters squared118 centimeters squared ORDENAR DE MAYOR A MENORa) -1, 3, 0, 2, -4 : b) 1, -10, 7, -9, -2 : c) 6, -3, 2, -1, -12 : d) 0, 8, -4, 2, -2 porfa Find five rational numbers between 3/5 and 4/5 plz help its timed... What is 45 quarts= ___ pounds The five number summary of a dataset was found to be:1, 5, 11, 17, 20An observation is considered an outlier if it is below:An observation is considered an outlier if it is above: people / organizations to give out money to companies and businesses are called What is the main issue in "letter from birmingham jail" ? Pop up spring LabDescribe the energy conversion that took place. What energy was present just before the jump? What energy is present at its maximum height? What happens in between? Draw bar charts of energy before the jump, while the spring toy is compressed and after the jump at the maximum height of its jump. Be sure to label each type of energy. In the years leading up to World War I, European countries like Great Britain and France were very interested in please help I don't know how to do Plz help me this is urgent!!What is the area of the triangle below?O 27 square unitsO 45 square unitsO 54 square unitsO 90 square units It was 7 F outside. The temperature dropped 16.How cold did it get? A. -23 FB. -16 F C. -9FD. 9FE. 23 F A company receives $290, of which $15 is for sales tax. The journal entry to record the sale would include a Label the ways that water and nutrients get into a plant PLEASE HELP How did the economic impacts of the Great Depression differ in the UnitedStates and the Soviet Union? please help!!! i will mark brainliest!! [tex]2 {a}^{2} - 3ab + {b}^{2} from3 {a}^{2} + 2ab - {b}^{2} [/tex]