answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
2 years ago
12

Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul

a. Where will the CPU store data for easy access and quick retrieval during these computations?
A) read-only memory 
B) random- access memory 
C)  Hard disk 
D) Compact disk 
Computers and Technology
2 answers:
EastWind [94]2 years ago
8 0

Answer: B) random- access memory(RAM)

Explanation: Random-access memory is the memory unit  of the operating system that operates at high speed and can be accessed randomly The data stored in this memory can be revived till the system is on position.

According to the case mentioned in the question,Samantha can retrieve the formula stored in the form of data from RAM and use it whenever she requires it for calculation till the computer is on.This shows the volatile nature of RAM.

Other options are incorrect because read-only memory(ROM) can store data which can be only read, hard disk is non-volatile disk that stores data and compact disk(CD) stores data using light .Thus, the correct option is option(B).

MrMuchimi2 years ago
4 0
B. random-access memory
You might be interested in
Imagine a business where there are no clear boundaries defined for data and systems ownership. As a security professional, descr
laiz [17]

Answer:

Loss of confidentiality, integrity and Availability

Explanation:

First I would start by explaining data ownership and system ownership

<u>Data ownership</u>:

Such an owner is responsible for safeguarding data, has all rights and complete control of the data. He or she can transfer data responsibility to someone else

<u>System ownership</u>:

The responsibility here is system maintenance, taking care of system functionalities, updating system and system software.

<u>Lack of data ownership</u>:

1. This affects privacy of data as there would be no one involved in the monitoring and taking care of the data. It would be at risk as sensitive information may get out and data may even be modified.

2. Lack of data ownership could bring about inconsistency in data

3. Lack of data ownership piles up risks to data which may cause great loss to data eventually.

<u>Lack of system ownership</u>:

1. There would be no one available to take care of issues that may come up with the system

2. If system gets to be outdated, it becomes open to malware and hackers

3. Work will be unable to be completed on the system.

<u>Loss of CIA triad</u>

CIA stands for confidentiality, Integrity and Availability

1. Without data ownership there would be access to data which is unauthorized. This brings about loss in confidentiality, and there could be issues with data availability

2. If system gets malware at the absence of system owner then there would be loss in confidentiality, integrity. Hackers would take control of the system and they would be able to use data.

3 0
2 years ago
What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
Nastasia [14]

Answer:

"Classification" is the correct answer to this question.

Explanation:

Classification is primarily a method of data processing, it makes easy for information to be separated and divided into a different business or personal goals by the data set demands.  

  • It's also known as a mechanism of sorting or identifying information in different types of aspects or groups in the categorization of data.
  • It is used to allocate the confidential information to the level of sensitivity.
5 0
2 years ago
Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argum
Nata [24]

Answer:

// importing the necessary libraries

import java.util.Scanner;

public class BackwardString {

public static void main(String[] args) {

String input;

// Scanner object to read string from user input

Scanner scanner = new Scanner(System.in);

System.out.print("Enter String here : ");

input=scanner.next();

// calling backward method to reverse passed string

backward(input);

// closing Scanner object

scanner.close();

}

// Method to Reverse the input string

private static void backward(String source) {

int i, len = source.length();

StringBuilder dest = new StringBuilder(len);

for (i = (len - 1); i >= 0; i--){

dest.append(source.charAt(i));

}

System.out.println("Reversed String : "+dest);

}

}

Explanation:

// importing the necessary libraries

import java.util.Scanner;

public class BackwardString {

public static void main(String[] args) {

String input;

// Scanner object to read string from user input

Scanner scanner = new Scanner(System.in);

System.out.print("Enter String here : ");

input=scanner.next();

// calling backward method to reverse passed string

backward(input);

// closing Scanner object

scanner.close();

}

// Method to Reverse the input string

private static void backward(String source) {

int i, len = source.length();

StringBuilder dest = new StringBuilder(len);

for (i = (len - 1); i >= 0; i--){

dest.append(source.charAt(i));

}

System.out.println("Reversed String : "+dest);

}

}

The program above accepts a String object as an argument and displays its contents backward.

It reverses the any string inputed while producing the output.

6 0
2 years ago
Assume there is a machine with the IP address 129.82.102.63 with netmask /23, and with a parent NW whose netmask is 255.255.224.
blagie [28]

Complete question is:

Assume there is a machine with the IP address 129.82.102.63 with netmask /23, and with a parent NW whose netmask is 255.255.224.0.

For each answer, do not include any spaces, give full IP addresses/netmasks where these are requested, give the "/" as part of the answer for slash notation.

a. What is the parent NW's netmask in dotted decimal notation?  

b. What is the parent NW's netmask in slash notation?  

c. What is the child NW's (subnet's) netmask in dotted decimal notation?  

d. What is the child NW's (subnet's) netmask in slash notation?  

e. How many bits are there for host # portion for the parent NW? (Another way to say the same thing is How many bits do we manage - on the parent NW?)  

f. How many bits are there for NW# portion (within the parent address space) for the subnet?

g. How many bits are there for host # portion for the subnet?  

h. How many addresses can we assign to machines/interfaces on this subnet?

Answer:

a. 255.255.224.0

b. /19

255.255 amounts to 16 bits being 1. .224 means 3 more bits are 1. So, in total 19 bits are 1. Hence, total network bits are 16 + 3 = 19.

c. 255.255.254.0

/23 means 8 + 8 + 7 that means

first 2 octets are 1s and 7 bits out of the 3rd octet are 1s. Hence, /23 means 255.255.254.0

d. /23

e. 13 bits are reserved for hosts

Parent network mask is /19, so total 32-19 = 13 bits

f. 19 bits are reserved for the network in the parent address.

g. 9 bits

Subnetwork's mask is /23, so total 32-23 = 9 bits for the host portion.

h. Since 9 bits are reserved for hosts, a total of 29 -2 = 510 machines can be assigned the IP addresses. Two addresses will be network and broadcast addresses for the subnet that can't be allocated to any device.

Explanation:

3 0
2 years ago
15. It is the process of capturing data or translating information to recording format
Helen [10]

Answer:

A Documentation, hope this helps.

5 0
2 years ago
Other questions:
  • Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
    15·2 answers
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • Describe a situation involving making a copy of a computer program or an entertainment file of some sort for which you think it
    7·1 answer
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the el
    10·1 answer
  • Remember that it is desirable for good block ciphers that a change in one input bit affects many output bits, a property that is
    9·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • How does the discussion of “Luddites,” “Marx,” and “John Maynard Keynes” in paragraph 21 contribute to the development of the id
    7·1 answer
  • Write a program that reads the lengths of the sides of a triangle from the user. Compute the area of the triangle using Heron's
    8·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!