How is primary storage different from secondary storage? Select the TWO correct statements.
The CPU can only read and write data on secondary storage.
o Users can only read and write data on primary storage.
The CPU can only read and write data on primary storage.
Users can only read and write data on secondary storage,

Answers

Answer 1
Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.
Answer 2

Answer:The CPU can only read and write data on primary storage.

 Users can only read and write data on secondary storage.

Explanation:


Related Questions

What is the difference between a prefix and postfix in Java?

Answers

Answer:

prefix comes first

Explanation:

pre means before, and post means after.

Why did they removed the watch video button to view answers?​

Answers

Answer:

Umm I’m not sure

Explanation:

2. True or False: You can create a network with two computers.
a. True
b. False

Answers

A computer network is a collection of connected computing devices that may or may not be able to communicate.
So I think yes its true

You can create a network with two (2) computers: a. True.

A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.

In Computer networking, a network design is also known as network architecture and it refers to an iterative process that involves the planning, topological design and implementation of a computer network infrastructure.

Basically, a network can be created by two (2) or more computer systems. Thus, a network designer can create a network with at least two (2) computers by connecting them together through a wired or wireless connection.

Read more on networks here: https://brainly.com/question/8808883

Write down the characterizations that best suits the term Java applets?

Answers

Answer:

Java applets need to have virtual machine web browser support

Explanation:

Java applets are defined as the small applications that are written using the Java programming language or may be some other programming language which compiles of Java bytecode and it is delivered to the users in form of java bytecode.

They provides interactive features to the web applications.

The characterization that suits java applets are :

-- It application should be able to run on virtual machines

-- It must support web browser. The web browser must be capable to run the java applets.

Which of the following choices are good strategies when exercising in extreme heat or cold?
A.
allowing the body to adjust to temperature
B.
avoiding exercising during extreme times of day
C.
warming up muscles and the body before vigorous exercise
D.
all of the above


Please select the best answer from the choices provided.

A
B
C
D

Answers

Answer:

The answer is C.

Explanation:

The answer is C because you always have to warm up before exercising and neither of the other answers make sense and the last answer can't be possible if the others are incorrect.

The answer is c because warming up muscles and the after the bossy


7. It is used for smoothening the soil and gathering loose leaves, hay, or straw.

Answers

Answer:

a rake and/or gardener rake

Explanation:

I think the answer is A rake

Rewrite the following condition to avoid a possible arithmetic exception:

if (Math.sqrt(x) < 3 && x > 7)

Answers

Answer:

if (x > 7 && Math.sqrt(x) < 3)

Explanation:

The previous condition checks if the square root of x is less than 3, but this would raise an error if x is a value equal to or less than 0.

So, the condition checks for the value of x before evaluating the square root after the AND operation to prevent an arithmetic exception.

which type of network is the internet? choose the answer

Answers

Answer:

WAN or wide area network

Explanation:

The Internet is the most basic example of a WAN. It is connecting all computers together around the world.

Which of the following correctly describes a work in the public domain?
A:Being part of an individual's personal collection
B:Belonging to society as a whole and not subject to copyright
C:Enduring the test of time like Beethoven, Shakespeare, and Van Gogh
D:Existing in civic locations like libraries and schools

Answers

Answer:

B

Explanation:

I took the test got a 100

What is the name of situation where the same data is stored unnecessarily at different places?

Answers

Answer:

Data redundancy.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

Data redundancy is the name of situation where the same data is stored unnecessarily at different places.

Simply stated, data redundancy can be defined as a condition which typically involves storing the same data in multiple storage locations. Thus, data redundancy connotes the unnecessary repetition of the same piece of data (informations) either deliberately or for some specific reasons.

Which type of books contains snapshots of steps that help to perform an activity?
Α. .
textbooks
B. online books
C. library books
D.
DIY books
E.
handbooks

Answers

Answer:

online book,,.........,.

The correct answer is online books

Which of the following statements is true about DVI connectors? *

Answers

Answer:

I think u had forgot to mention the statements.

Answer: they are digital and analog!

Explanation:

II. MULTIPLE CHOICE (five points each)
6. Units on the mechanical scale are marked off in:
a. Fractions and millimeters
b. Feet and inches
c. Inches and fractions
7. Units on the architectural scale are marked off in:
a. Fractions and feet
b. Scales and measuring devises
c. Feet and inches
8. Units on the civil scales are marked off in:
a. Whole numbers and feet
b. Whole numbers and fractions
c. Decimals with no fractions
9. The number zero is:
a. The end of the metric scale
b. The middle of the scale
c. The beginning of all scale
10. The metric scale is marked off in:
a. Both inches and fractions
b. Architectural units and metric
c. Meters

Answers

Jsjajxhuwjakzjwidhwbjrjsbd

When using a powder actuated tool, ______

Answers

I think the answer is D but i don’t know hope I helped sorry

Write a program to test the class LinkedBag. For example create a bag by asking the user for few names then 1.Put those names in the bag. 2. ask the user for a name and delete it from the bag. 3. ask for a name and check whether it is in the bag or not 4. print all names in the bag.

Answers

Answer:  lolllllllllllllllllllllllllllllllllllllllllllllllllllllllll

Universal containers set the organization-wide defaults for cases to private. When a case is escalated, case ownership changes to Tier 2 support agent. (Included) How can a system administrator give the sales operation team read/write access to all escalated cases?

Answers

Answer:

Create an ownership-based sharing rule.

Explanation:

Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.

Some examples of the various types of workflow management systems used around the world includes YAWL, Windows Workflow Foundation, Apache ODE, Collective Knowledge, Workflow Gen, PRPC, Salesforce.com, jBPM, Bonita BPM etc.

In this scenario, Universal containers set the organization-wide defaults for cases to private and when a case is escalated, case ownership changes to Tier 2 support agent. Thus, the system administrator should create an ownership-based sharing rule so as to give the sales operation team read/write access to all escalated cases. An ownership-based sharing rule is essentially based on the owner of a record (record owner) rather than the values of the record.

Write a program that opens a specified text file then displays a list of all the unique words found in the file.

Answers

Answer:

filename = input("Enter file name with extension:")

words = []

with open(filename, "r") as file:

   # read the file line by line, with each line an item in the returned list

   line_list = file.readlines()

   # loop through the list to get the words from the strings

   for line in line_list:

       word_list = line.split(" ")

       for i in word_list:

           words.append(i)

# use the set() to get the unique items of the list as a set

# and convert it back to a list, then display the list.

su_words = set(words)

unique_words = list(su_words)

print(unique_words)

Explanation:

The python program gets the file name from the user input method. The with keyword is used to open and read the file which is read line by line as a list of strings (each line is a string). The for loop is used to append each word to the words list and the set() function cast the words list to a set of unique words. The set is in turn converted back to a list and displayed.

Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N : Lather and rinse." num_cycles times, where N is the cycle number, followed by "Done.".

Answers

Answer:

Following are the code to the given question:

def shampoo_instructions(num_cycles):#defining a method shampoo_instructions that accepts num_cycles as a parameter

   if num_cycles < 1:#defining an if block that num_cycles value is less than 1

       print('Too few.')#print message  

   elif num_cycles > 4:#defining elif block that checks num_cycles is greater than 4

       print('Too many.')#print message  

   else:#defining else block

       N= 1;#defining N variable that holds a value 1

       for N in range(N, num_cycles+1):#defining for loop that check value in range

           print(N , ": Lather and rinse.")#print message  

       print('Done.')#print message  

shampoo_instructions(2)#calling the method

Output:

1 : Lather and rinse.

2 : Lather and rinse.

Done.

Explanation:

In this code, a method "shampoo_instructions" is defined, that accepts a variable "num_cycles" in its parameter, and in the next step, the multiple conditional statements have used that check the "num_cycles" values which can be defined as follows:

The if the block checks the parameter value is less than 1, and it prints the value as the message. In the next step, the elif block is used that checks parameter value is greater than 4, and it prints the value as the message. In the else block, it uses the for loop that checks the value in the range and prints its value and calling the method.

The computer components that enables a computer to send and receive data, instructions or information from one or more computers or mobile device are

Answers

Answer:

communications device

Explanation:

Ann, a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. What is MOST likely occurred on Ann's computer?

Answers

Answer:

The computer has been infected with crypto-malware

Explanation:

From the question, we are informed about Ann, a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. In this case, What is MOST likely to occurred on Ann's computer is that the computer has been infected with crypto-malware.Crypto-malware can be regarded as one of the malware threats that very common, and very insidious compare to some malware because it can't be easily detected. It is known as one of the malware that steal data and can hide in background for long mining there

Memory cards from your cameras (SD cards) and flash drives are examples of __________.

Answers

Answer:

I think it's the example of

Explanation:

Data Storage.

What are the Edhesive 3.4 lesson practice answers

Answers

Answer:

import time

# Input yellow #

yellow = input("Enter yellow: ")

# If yellow #

if yellow == "yellow":

print("Correct")

else:

print("Nope")

Explanation:

What kind of block do you need to check whether a sprite is touching another sprite?

A. forever block

B. A repeat 10 block

C. An if block

D.An event block​

Answers

A event block i know this im i have been in technology for 5 months

How can injection attacks be prevented? Check all that apply

Answers

if one of the answers is "input validation" and "Data sanitization" it's those two.

By Input validation and data sanitization injection attacks can be prevented. The correct options are a and d.

What is injection attack?

Untrusted inputs or illegal code are "injected" into a programme during an injection attack and are then understood to be a query or command. As a result, the programme is changed and directed toward a malicious end.

enables an attacker to submit code to a web application that the web server will then locally execute.

This kind of attack takes advantage of the web application's inability to filter user-provided data before it is inserted into a server-side interpreted HTML file.

Injection vulnerabilities are often caused by insufficient user input validation. Attacks on data injection can be avoided by using input validation and data sanitization.

Thus, a and d are the correct options.

For more details regarding injection attack, visit:

https://brainly.com/question/15685996

#SPJ2

Your question seems incomplete, the missing options are:

Input validation

Flood guards

Log analysis systems

Data sanitization

Michael dropped his tablet on the floor and shattered his screen. He was able to get the screen fixed, but to prevent the screen from breaking again, what should Michael do?

Use an electronic wipe to clean the tablet.
Use a protective case for the tablet.
Use the tablet on a soft surface.
Use one hand when carrying the tablet.please help i would give u 10 points

Answers

Use a protective case for the tablet , cuz the case is hard and rigid and holds the iPad together so it won’t break when it drops again

Answer:

B

Explanation:

got 100

Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?

a. Test Sandbox
c. Test Sandbox
c. Full Sandbox
d. Partial Sandbox
e. Developer Pro

Answers

Answer:

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

Explanation:

Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?

a. Test Sandbox

c. Test Sandbox

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

From the question, we are informed that Universal Containers wants to use a sandbox with real data in it. In this case I will recommend Full Sandbox, Partial Sandbox and Developer Pro.

Sandboxes. In cybersecurity sandbox can be explained as security mechanism that is utilized to separate running programs, and this is an effort utilized to curb system failure as well as software vulnerabilities to disperse.

Sandboxes are crucial when executing suspicious code, it helps to do this so that the host device is is not put to risk of harm. Since, Containers wants to use a sandbox with real data in it then the three types of sandboxes can be use.

✓Full sandboxes allows performance testing as well as staging it can be regarded as copy of production org, and these can be objects attachment and others

✓Partial Copy Sandbox can be allows copying of configuration and part of one's data, in order to allow new configuration testing with one's real data.

Linette works in software development. She usually starts her day by meeting with the project manager to discuss the overall progress of the software. After that, she holds a meeting with the team of developers to hand out work based on upcoming deadlines and then goes on to help with overall development problems. Linette tries to end each day by sending an encouraging email to her team to remind them how appreciated they are. What is MOST likely Linette's job title?

A. Project Manager
B. Systems Designer
C. Lead Developer
D. Quality Assurance Specialist

Answers

Answer:

C

Explanation:

Lead developer.

What type of technology we need to use in order to make sure that users can freely room from one room to another one without wi-fi being disconnected

Answers

We’d use a mesh WiFi network

Harlequin frogs are an endangered species that live in a small area of Costa Rica. The reasons for the species' decline is unknown. Scientists want to create a computer simulation of the frogs' environment and determine how best to protect the frogs.
Which of the following is NOT true about the scientists' simulation?
a. The scientists must be careful of how many variables they include in their simulation so they do not cause further harm to the frogs.
b. The scientists can try a variety of different simulations and analyze the data to see which one is the most effective.
c. Based on the results of the simulation, scientists can develop a plan to save the Harlequin frogs before they become extinct.
d. The scientists can incorporate other factors, such as square footage of protected land, in the simulation.

Answers

Answer:

a. The scientists must be careful of how many variables they include in their simulation so they do not cause further harm to the frogs.

Explanation:

It is not statistically accurate to assume that the number of variables included in the simulation would cause further harm to the frogs because we need to remember that a simulation is simply a computerized imitation of a real situation, which is usually not totally alike with a real process.

So in no way from a statistical standpoint, does the scientists' decision on the number of variables causes direct harm to the frogs.

Chose the term that matches each definition.

: predicts technology power and capacity will double every two years


: a device invented by Douglas Engekbart to work with graphical operating systems

Answers

Answer:

Moore's Law: predicts technology power and capacity will double every two years

Computer mouse: a device invented by Douglas Engekbart to work with graphical operating systems

Explanation:

Other Questions
Question: What is the fractional value of A? Will give brainliest for correct answer and quick answer! help ;w;Which equation correctly represents the ionization process? a. element + ionization energy --> ion+1 - 1 electron b. element + ionization energy --> ion-1 + 1 electron c. element + ionization energy --> ion+1 - 1 electron d. element + ionization energy --> ion+1 + 1 electron Sigma is thinking about purchasing a new clam digger for $14,000. The expected net cash flows resulting from the digger are $9,000 in year 1, $7,000 in the 2nd year, $5,000 in the 3rd year, and $3,000 in the 4th year. Should Sigma purchase this digger if its cost of capital is 12%? a. Yes, NPV = $5,084 b. Yes, NPV = $16,605 c. Yes, NPV = $3,176 d. Yes, NPV = $19,084 Below are eight statements about the events in the Persian Wars. Write the sentences in the order in which they happened in the graphic organizer 2. Agrocer has a block of cheese that has length 12 inches, width 4 inches and height 3inches. Then he slices the cheese into two equal triangular prisms. What will be thelength of the of the rectangular cross-section? (If necessary, round your answer to thenearest inch.) Which of the following statements is correct regarding the reactants and products for photosynthesis and cellular respiration?Carbon dioxide and water are reactants in photosynthesis and products of cellular respiration.Carbon dioxide and water are reactants in cellular respiration and products of photosynthesis.Carbon dioxide is a reactant of cellular respiration, and water is a product of photosynthesis.Carbon dioxide is a product of photosynthesis, and water is a reactant in cellular respiration. The general manager of a pizza restaurant is running a surprise promotion in which every customer on a particular day has a 2% probability of winning free pizza for a % probability of win vear. (a) How many customer should the general manager expect until there is a winner? (b) If there were 150 customers on a day of the promotion, what is the probability that (i) none of the customers won?) That exactly one customer won? and iii) That at least two customers won? Town Bank offers a 2.25%interest rate, while Charter OneOffers 2.8%. Both banks compoundinterest annually. If Rob wants toset up a new account with $5,000,how much more money will heearn at Charter One over TownBank after 25 years? The power to effect change in someone or something is known as ____. PLEASE HELP !! WILL GIVE BRAINLIST!! The foundation of a shed is in the shape of a square with an unknown side length. The diagonal of the square, from one corner of the foundation to the other, is 15ft. Which of the following equations could be used to find the length of a side of the square foundation?a) x^2=15b) 2x^2=225c) x^2=225d) 2x^2=15 Classify the following triangle. Check all that apply.A.RightO B. ObtuseDc. IsoscelesD. AcuteDE. Equilateral0F Scalene how many solutions does this system have?x+3y=012y=-4x how many liters is 1.9 mol of Cl2 at STP? Help please! In the 1800s, what began to happen to European empires? The strengthened They grew in numbers They began to destabilize They began absolute monarchies Rent controls force landlords to price apartments below the equilibrium price level. An immediate effect is a shortage (excess demand) of apartments because the quantity of apartments demanded is greater than the quantity supplied at the regulated price.When cities prevent landlords from charging market rents, which of the following are common long-run outcomes?a. Black markets develop.b. The quality of available rental housing units falls.c. Landlords earn lower profits renting housing units, but the rent charged has no effect on either the quantity or quality of rental units.d. Nonprice methods of rationing emerge. Which of the following is a molecular compound?D KID CC14NaBr0 MgCl2 Jared sold 194 Boy Scout chocolate bars. Matthew sold three times as many as Jared. Gary sold 297 fewer than Matthew. How many bars did Gary sell Many manufacturers prefer plastic as a material forcontainers because it can be molded into many shapes.But plastic is not very strong. It must be fused with glassor steel for strength. It is also not very durable. Even thestrongest plastic can break under enough pressure. Thebiggest disadvantage to using plastic is that it does notdecompose. While plastic can be recycled, doing so istedious and difficult. While it may be more expensive anddifficult to work with aluminum is a much strongerbuilding material with far greater tensile strength. Itconduets electricity because it is metal. Best of all,aluminum is very easy to recycle. Even if it is thrown away.it decomposes much more quickly than mostmanufacturing materials.Which statement best describes how the compare and contrast pattern of thetext supports the author's purpose?PREVIOUS (2 5/8 5/6)+ 1 1/8 what is the answer? Drag the tiles to the correct boxes to complete the pairs.Match each individual to his role in the American Industrial Revolution.Moses BrownEli WhitneyFrancis Cabot LowellJohn Deereinvented the cotton gin, a machine used to removeseeds from cotton fiber with great speedbuilt the first American textile mill in Pawtucket, Rhode Islandinvented a steel plow to replace the wrought-iron one that wastraditionally usedstarted the Boston Manufacturing Company