When you load a program in windows, the pc copies the program from the mass storage device to _______________ and then runs it.

Answers

Answer 1

When you load a program in windows, the pc copies the program from the mass storage device to RAM and then runs it.

RAM is an abbreviation for random access memory. RAM is used to store programs and data that can be read and altered in any order. RAM has the advantage over hard disk drives as it is more convenient and faster to read and write from.

One of the disadvantages of this type of memory is that it cannot store data permanently as the data is lost when the computer is shut off.

RAM is stored in microchips of the pc and can bear only a small amount of data.

Dynamic random access memory and static random access memory are the two main types of RAM that differ in that the static random access memory the data does not need to be constantly refreshed.

To know more about RAM, click here:

https://brainly.com/question/3157583

#SPJ4


Related Questions

Lower range tones generally require ________ speakers. lower range tones generally require ________ speakers. multiple choice
a. slimmer
b. larger
c. more compact
d. smaller

Answers

Lower range tones generally require larger speakers.

It's no secret that lower range tones generally require larger speakers. This is because lower frequencies have longer wavelengths, and thus require more physical space to produce.

While this may seem like a simple concept, there are a few things to keep in mind when it comes to speaker size and low frequency response. First, larger speakers can usually reproduce lower frequencies more efficiently than smaller ones. Second, the size of the speaker's enclosure also plays a role in how well it can reproduce low frequencies.

A larger enclosure will typically have an easier time reproducing low frequencies than a smaller one.

Keep these things in mind when selecting speakers for your system. If you're looking for accurate low frequency reproduction, make sure to choose speakers with larger drivers and enclosures.

Learn more on speakers here:

https://brainly.com/question/14649463

#SPJ4

You have a computer that runs on a windows 10 operating system and supports modern sleep. what will happen if you close the lid of the computer?

Answers

You have a computer that runs on the Windows 10 operating system and supports modern sleep mode what will happen if you close the computer lid is the computer will be put into sleep mode. If Modern Sleep is supported, the settings for closing the lid will be configured to trigger sleep mode.

A computer system is a basic, complete and functional arrangement of hardware and software with everything needed to implement computing performance. That is the basic working definition of a computer system as we know it, but computer systems have gone through many formal changes over the last few decades.

The physical components of a computer can also be interpreted as hardware. This includes the keyboard, mouse, monitor and processor. Hardware consists of input devices and output devices that make up a complete computer system. Examples of input devices are keyboards, optical scanners, mice and joysticks that are used to enter data into a computer.

You can learn more about computer system here https://brainly.com/question/14583494

#SPJ4

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?.

Answers

On this spreadsheet, a feature which Debra should use to find the answer is the What-if analysis.

In order to execute the following actions on a data collection, a spreadsheet application is a type of computer software that is frequently made with cells that are organised in rows and columns in a tabular fashion:

GenerateSortCalculateFormatArrange

Debra, a short version of the Hebrew female given name Deborah, means "bee." The Book of Judges in the Old Testament has this Biblical phrase. The only female judge described in the Bible, Deborah was a hero and prophetess.

Phyllis Hilton, whose daughter Debra had EB, created DEBRA in 1978; it was the first organisation for EB patients in the globe.

Learn more about Debra:

https://brainly.com/question/28503666

#SPJ4

A three phase generator has each of its windings out-of-phase with each other by ? .

Answers

A three phase generator has each of its windings out-of-phase with each other by 120 degrees.

What is Three phase generator?

An AC three-phase generator is known to be called the three AC single-phase generators.

They are said to be generators that tends to run sequentially with a kind of offset of 120° that often exist between them been taken two at a time.

Therefore, based on the above, one can say that the three phase generator has each of its windings out-of-phase with each other by 120 degrees.

Learn more about three phase generator from

https://brainly.com/question/15052099

#SPJ1

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program?

Answers

A type of threat actor which would benefit the most from accessing your enterprise's new machine learning algorithm research and development program is: D. competitors.

What is machine learning?

Machine learning (ML) is also referred to as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

Who is a competitor?

A competitor can be defined as a type of threat actor who is generally fond of who launching attacks against its opponent's information system in order to steal sensitive and classified information such as industry research and development program or customer list.

Read more on competitors here: https://brainly.com/question/28431554

#SPJ1

Complete Question:

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program? a. Shadow IT b. Brokers c. Criminal syndicates d. Competitors.

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

Answers

An attack that relies on redirected and captured secure transmissions as they occur is known as man-in-the-middle attack.

A vulnerability called URL Redirection enables an attacker to push users of your application to a dubious external website. The target is typically given a link, which is subsequently clicked and unintentionally led to the malicious website, launching the attack.

Attackers use open redirects to give their phishing attacks more legitimacy. The majority of users see the reliable, trustworthy domain but are unaware that they are being sent to a phishing site.

The most frequent type of DDoS attack is volumetric, and because of its growing magnitude, it frequently makes headlines. In an effort to use up all of the network bandwidth available to the application, these assaults saturate the network with attacker-generated data.

Learn more about man-in-the-middle attack:

https://brainly.com/question/15344208

#SPJ4

Assume double[][][] x = new double[4][5][6], what are x.length, x[2].length, and x[0][0].length?
a. 4, 5, and 4
b. 4, 5, and 6
c. 6, 5, and 4
d. 5, 5, and 5

Answers

If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; b; 4, 5 and 6

How to Interpret Multidimensional Array?

In C/C++, we can define multidimensional arrays in simple words as an array of arrays. Data in multidimensional arrays are stored in tabular form (in row-major order).  

General form of declaring N-dimensional arrays:  

data_type  array_name[size1][size2]....[sizeN];  

data_type: Type of data to be stored in the array.  

Now, if we Assume double[][] x = new double[4][5], then we can say that x.length and x[2].length are; 4 and 5

In a similar form, If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; 4, 5 and 6

Read more about Multidimensional Array at; https://brainly.com/question/23459333

#SPJ1

When error messages indicate that the windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem?

Answers

The tool or method is the first best option to fix the problem is Use bootable media to launch Windows RE and use System Restore to apply a restore point.

What is the command about?

If  Windows 7 registry is known to be corrupted and a person is unable to boot from the hard drive, one can be able to fix the problem by the use of commands that can be obtained from the Windows Recovery Environment to be used to recover the registry from backup.

Therefore, The tool or method is the first best option to fix the problem is Use bootable media to launch Windows RE and use System Restore to apply a restore point.

Learn more about Windows registry  from

https://brainly.com/question/10621447

#SPJ1

When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second-best option?

Use bootable media to launch Windows RE and use System Restore to apply a restore point.

Use bootable media to launch Windows RE and perform a startup repair.

Use bootable media to launch Windows RE and then use commands to recover the registry from backup.

Refresh Windows using a system image or custom refresh image.

What positive integers have the following binary representations?
(a) 10010
(b) 10011
(c) 101010
(d) 10011110000

Answers

The positive integers have the following binary representations  are,

a.18    b.19

c.42  d.1264

What is a positive integer meaning?

An integer is positive if it is greater than zero; otherwise, it is negative. Zero is defined as not having either a positive or negative value. Consequently, the following is a list of positive integers: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. and so on.

The lowest positive integer is 1, and there is no way to calculate the greatest positive integer, whose size is limitless. Zero is a positive integer since it lacks a negative sign. All the numbers on a number line that are to the right of zero are known as positive integers.

To learn more about positive integers, refer to:

https://brainly.com/question/13292955

#SPJ4

You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protocols a security issue that you should be concerned about?

Answers

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

In addition to oracle, another source of hypervisors for macos desktops is ________.

Answers

In addition to Oracle, another source of hypervisors for macOS desktops is Parallels. Therefore, the correct answer option is B. Parallels.

What is virtualization?

Virtualization can be defined as the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components (features) which is not required for a successful virtualization environment include the following:

Virtual machineHost machineHypervisors

In Macintosh computers, oracle and parallel are sources of hypervisors.

Read more on virtualization and hypervisors here: https://brainly.com/question/28528924

#SPJ1

Complete Question:

In addition to Oracle, another source of hypervisors for macOS desktops is _____. A. Microsoft B. Parallels C. Apple D. Intel. B. Host key.

In a category of games known as _________, millions of players connect to various servers to team up with other players in very large virtual worlds.

Answers

In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

What do MMORPGs mean?

The term  MMORPG connote  massively multiplayer online role-playing games.

This is known to be a type of video game that tends to make use of different elements of role-playing games (RPGs) along with those of the gameplay of multiplayer online gaming worlds.

Therefore, In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

Learn more about virtual worlds from

https://brainly.com/question/13873769

#SPJ1

The set of analytical techniques that yield a best course of action is _____ analytics.

Answers

The set of analytical techniques that yield the best course of action is prescriptive analytics.

What is Analytics?

This refers to the systematic computational analysis of data or statistics that is used to interpret data and find patterns in the data.

Hence, we can see that The set of analytical techniques that yield the best course of action is prescriptive analytics.

This is because when the best course of action is taken into consideration, it has to do with finding the best solutions.

Finding the best solutions also has to do with finding best courses of action and this type of analysis is known as prescriptive analytics.

Read more about analytical techniques here:

https://brainly.com/question/28139087

#SPJ1

How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.

Answers

The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Why are amino acids called residues?

The  Amino acids are known to be compounds that are said to be called residues if there is  two or more amino acids that are known to be bond with each other.

Note that the amino group on one amino acid is one that tends to interacts with the carboxyl group and as such  form a peptide bond.

Therefore, The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Learn more about amino acids from

https://brainly.com/question/2526971

#SPJ1

The most widely used operating systems on larger servers is one of the many versions of ____.

Answers

Answer: UNIX

Explanation: Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

What paradigm is this code based on? How do you know?
What does the number 16 mean in this code? How do you know?
Imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. Using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.
How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use “coding” or creating programs outside of computer science and explain how it uses coding-related concepts.
Imagine that you were programming without an IDE. What problems might you encounter?

Answers

Answer:

I Don't Know

Explanation:

nsjskdoeowowokskdnekmek biien

Machine language is the set of binary-coded instructions that are executed directly by a computer. True or false

Answers

Answer:

true

Explanation:

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages; True.

What is the Unicode coding scheme?

The Unicode coding scheme is sometimes referred to as the Unicode data set and it typically comprises 65,536 characters in order to provide support for several international languages and symbols.

In this context, we can reasonably infer and logically deduce that it is very true that the Unicode coding scheme supports a variety of characters, symbols, and international languages such as:

The Chinese language.The Japanese language.The Arabic language.YorubaIgboFrench

Read more on Unicode coding scheme here: https://brainly.com/question/24846400

#SPJ1

This button helps with

A. Inserting a link
B. Capitalization
C. Indentation
D. Line Spacing

Answers

This button changes line & paragraph spacing. For example, it can change spacing from Single to Double.

Answer:

B.adding and deleting rows

Explanation:

Plato

Tools discovered that date to the paleolithic period revolve around what activity?

Answers

Tools discovered that date to the paleolithic period revolve around Hunting activity.

What was Hunting like in the paleolithic period?

The people in the Paleolithic era were known to be people who were said to have lived as well as survived by the act of  hunting and gathering.

Note that these people do search for food as their key activity, and it was said to be very difficult due to the fact that they need to learn the kind of animals to hunt and the plants to eat.

Therefore, Tools discovered that date to the paleolithic period revolve around Hunting activity.

Learn more about paleolithic period  from

https://brainly.com/question/540822
#SPJ1

The physical things that hold digitized information such as books and songs are called?

Answers

The physical things that hold digitized information such as books and songs are called Digital Media.

What is digital media and its importance?

Digital media are known to be any kind of device that is said to make use of  technology such as the use of the internet and other forms of electronic devices to make content, for example audio and video, websites, as well as social media things.

Note that the use of  digital media is seen as any kind  of content that needs to use of electronic devices to make, share and view that given media.

Hence, The physical things that hold digitized information such as books and songs are called Digital Media.

Learn more about Digital Media from

https://brainly.com/question/3653791

#SPJ1

For email links, use anchor elements to link to an email address by including the href attribute followed by?

Answers

For email links, use anchor elements to link to an email address by including the href attribute followed by mailto: and then the email address.

What are anchor elements used for?

The anchor element is known to be one that is often used to make hyperlinks that tend to between a source anchor and that of a destination anchor.

Note that the source is said to be the text, image, as well as the button that connect to another resource and the destination is seen as the resource that the source anchor tends to connect to.

Therefore, For email links, use anchor elements to link to an email address by including the href attribute followed by mailto: and then the email address.

Learn more about anchor elements from

https://brainly.com/question/11526390

#SPJ1

For email links, use anchor elements to link to an email address by including the href attribute followed by _____ and then the email address.

At which level of decision making are information systems are used to obtain aggregate summaries of trends and projections of the future?

Answers

At Executive level of decision making are information systems are used to obtain aggregate summaries of trends and projections of the future.

What is the executive level of decision making?

It is known to be the stage at where executives are said to be fully involved or engaged in some key areas of decision making.

Here, there is the exchange of information, reviewing of data, bringing up new  ideas, evaluating alternatives, and others.

Therefore, At Executive level of decision making are information systems are used to obtain aggregate summaries of trends and projections of the future.

Learn more about decision making  from

https://brainly.com/question/1249089

#SPJ1

What will happen if you are not media literate?

Answers

Answer:

You will be missing out alot. And it will effect you in the long run.

Explanation:

The reason why it will effect you in the long run is

- Unessary cost

Which is an action that an operating system preforms?
A) stores all data
B) gives signals and instructions to the computer
C) gives information processed by the computer
D) facilitates a computers basic functions between hardware and software

Answers

Answer:

acilitates a computers basic functions between hardware and software

Explanation:

_____ session mode connects the host to a guest vm using rdp and allows cutting and pasting between the machines.

Answers

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines.

If you've ever used remote desktop to connect to a Windows guest VM, you know that it can be a little tricky to transfer files between the host and guest. Fortunately, there's a feature called enhanced session mode that makes it a breeze.

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines. This makes it super easy to transfer files between the host and guest, and also makes it possible to use local devices like printers and scanners from within the guest.

To use enhanced session mode, simply connect to your guest VM using RDP and then click the "Enable enhanced session mode" button. Once you do that, you'll be able to use all of your host's devices from within the guest.

Learn more on enhanced session mode here:

https://brainly.com/question/14488447

#SPJ4

Jamie has just developed a small game. She shows it to her friends, but they are confused about what the point of the game is. What aspect of her game does Jamie need to work on?
A.
the rules of the game
B.
the objective of the game
C.
the outcome of the game
D.
the components of the game

Answers

Answer:

pls I think is the A. the rules of the game



As a Social Media Strategist you know that which of the following is typically used to build relationships with customers instead of selling products
to them?

Answers

Answer:

Post product reviews and promotions

Which method of sending a packet allows every computer on the lan to hear the message?

Answers

A method of sending a packet which allows every computer on the local area network (LAN) to hear the message is referred to as: B. Broadcast.

What is a network component?

A network component can be defined as a set of hardware and software resources that makes up a computer network such as:

RouterSwitchBridgeGatewayServer

What is a broadcast?

In Computer networking, a broadcast can be defined as a technique which typically involves the transmission of packets in order to enable every computer and other network components on the local area network (LAN) to hear the message.

Read more on broadcast here: https://brainly.com/question/14447945

#SPJ1

Complete Question:

Which method of sending a packet allows every computer on the LAN to hear the message? A. Omnicast B. Broadcast C. Unicast D. Multicast.

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Answer:

Sound recorder software

Explanation:

Other Questions
Underline the complete subject in each sentence. For sentencefragments, add a subject. Then write the sentence correctly. Usecapital letters and end marks.1. my class will go on a field trip to a museum next week The three major subclasses of lipids include phospholipids, steroids, and __________. which two countries came to the Americas looking for religious freedom? Antibiotics are powerful medicines for treating some infections, but they have limitations. while antibiotics are very effective in the treatment of bacterial infections, they do not work against viral infections. what differences between bacteria and viruses account for this? Assume there was $100,000 of rent when the company produced 1,000 units. what would be the cost per unit and in total to produce 2,000 units? If an observation period is divided into a number of time periods, and the behavior is recorded during only part of each interval it is called ______________ recording. Write a statement, ending with "- 1;", that decreases the value stored in apples by 1. the output of the statement should be suppressed. If+mortgage+rates+rise+from+5%+to+10%+but+the+expected+rate+of+increase+in+housing+prices+rises+from+2%+to+9%,+are+people+more+or+less+likely+to+buy+houses? Sodium losing an electron is an ________ process and fluorine losing an electron is an _______ process. What condition often found in type iii construction buildings is likely to negatively influence fire behavior? solve the similtaneous equations y=9-x y=2x^2+4x+6 Write the number described byI ten 16 ones. PromptDiscuss the characteristics and style of the high renaissance? The assumption that because the economy as a whole is better off as a result of a trade treaty, each individual industry must also be better off as a result of the treaty is an example of the:___. What is the main idea of this text? Shirley Chisholm was born in Brooklyn, New York and was the child of two immigrants, and she excelled on her debate team early on in her life. Shirley Chisholm spent her political career fighting for the rights of women, people of color, and poor people in many different political seats, even though she didnt win the Presidential nomination for the Democratic party. When Shirley Chisholm ran for President, many other Democratic candidates encouraged her to step down because they said she wasnt a serious candidate. Shirley Chisholm ran for the New York State Legislature and represented her district in Brooklyn, and she proposed bills to increase funding for daycare and schools. what british action angered many african colonists in the years before the American Revolution A.requiring colonial governments to pratice popular sovereignty B. attacking American indians who traded with colonists c. forcing colonists to relocate to western north America D. passing laws that affected the colonies without giving them a American Revolution how to reduce crime (c) Copper reacts with oxygen to produce copper oxide.63.5 g of copper produces 79.5 g of copper oxide. MrCalculate the mass of copper oxide produced when 0.50 g of copper reacts withoxygen.Give your answer to 3 significant figures. June is the coldest month of the year in the southern hemisphere. June is the warmest month of the year in the northern hemisphere. The subsolar point reaches 23. 5 south. The subsolar point reaches 23. 5 north 1.2. How can the South African government use the TWO methods below to redistribute income and wealth? 1.2.1 minimum wages