answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
2 years ago
4

A(n) _____ is anything about which data are to be collected and stored.

Computers and Technology
2 answers:
KengaRu [80]2 years ago
8 0

A memory is anything about which data are to be collected and stored.

<h2>Further explanation </h2>

Memory is a generic term for storing data on a computer. Memory is usually referred to as RAM, short for Random Access Memory. Memory serves as a temporary data storage area. Memory works by storing & supplying important data needed by the processor quickly to be processed into information. Where the greater the capacity, the more data that can be stored and supplied, which ultimately makes the processor work faster. Data supply to RAM comes from Hard Disk, a device that can store data permanently.

Memory capacity is expressed in bytes (1 byte = 8 bits) or words, word length is generally 8,16.32 bits.

Memory Cycle Time. It consists of access time plus the additional time needed by the transient to be lost on the signal channel or to reproduce the data if this data is read destructively.

Transfer Rate. The transfer rate is the speed at which data can be transferred to a memory unit or transferred from a memory unit. In RAM, transfer rate = 1 / (ikius time). For non-RAM there is a relationship:

N = TA + N / R

TN = Average time to read or write N bits.

TA = Average access time.

N = Number of bits.

R = transfer speed, in bits per second (bps).

There are four types of methods:

  • Sequential access. Memory is organized into data units called records.
  • Direct access. Direct access includes a shared Read/write mechanism. Each block and record has unique addresses based on physical location.
  • Random access. The time to access a particular location does not depend on the order of previous access and is constant.
  • Associative. A word is sought based on its contents and not based on the address.

Some types of memory that are widely used are as follows:

  • Processor register
  • RAM or Random Access Memory
  • Cache Memory (SRAM) (Static RAM)
  • Physical memory (DRAM) (Dynamic RAM)
  • Magnetic disk-based storage device
  • Optical disk-based storage device
  • Memory that can only be read or ROM (Read Only Memory)
  • Flash memory
  • Punched Card (old fashioned)
  • CD or Compact Disk
  • DVD

Learn more

Definition of Memory brainly.com/question/2898533

Method and type of memory brainly.com/question/2898533

Details

Class: high school

Subjects: Computers and Technology

Keywords: Memory, RAM, Data, storage

4vir4ik [10]2 years ago
6 0
Please provide some more institutionalization support.
You might be interested in
A router is involved in ____________ layers of the tcp/ip protocol suite.
GenaCL600 [577]
Network Layer of the TCP/IP protocol
3 0
2 years ago
Read first a user's given name followed by the user's age from standard input. Then use an ofstream object named outdata to writ
Stells [14]

Answer:

/*

* Program to write data to text file.

*/

#include<iostream>

#include<fstream>

#include<string.h>

using  namespace std;

int main()

{

//Variable to name and age of a person.

string name;

int age;

cout<<"Enter your name"<<endl;

cin>>name;

cout<<"Enter your age"<<endl;

cin>>age;

     //Creating object of ofstream.

   ofstream file;

   file.open ("outdata.txt");

   //Writing data to file named outdata.txt

   file<<name<<" "<<age;

   file.close();

 

}

Output:

Enter your name

John

Enter your age

25

Content of Output.txt:

John 25

Explanation:

To write data to a file  ofstream object is used. An ofstream object file is created first and then using this object a file named "outdata.txt" is created.

Finally using shift operator (<<), by means  of operator overloading, name and age of  person is transferred to file outdata.txt.

8 0
2 years ago
A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
Butoxors [25]

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

5 0
2 years ago
Mitchell is assisting her teacher in a project by entering data into the spreadsheet. Which types of data can Michelle enter in
Rainbow [258]

Hello, Paper, types of data that Michelle can enter into a cell is,

• Data – values, usually numbers but can be letters or a combination of both.

• Labels – headings and descriptions to make the spreadsheet easier to understand.

• Formulas – calculations that update automatically if referenced data changes.

Hope this helped!

4 0
2 years ago
Read 2 more answers
18. Which type of briefing is delivered to individual resources or crews who are assigned to operational tasks and/or work at or
GrogVix [38]

Answer: Field-level briefing

Explanation: Field-level briefing is the brief description that is provided to the crew members or operation task holders.This briefing contains the information about the work and operation that are to be followed by the workers on the site .

Field level briefing is sort of instructions to individual or group of people who will be working with their assigned duties on the incident site.

8 0
2 years ago
Other questions:
  • What is a cursor?
    6·2 answers
  • Corey set up his presentation for delivery to his team. The information he had to convey was critical to their job performance.
    6·3 answers
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
    5·1 answer
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • 4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first chara
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!