what is the role of the memory in a computer ​

Answers

Answer 1

Answer:

(RAM) Memory is used to load and run applications, such as your spreadsheet program, respond to commands, such as any edits you made in the spreadsheet, or toggle between multiple programs, such as when you left the spreadsheet to check email. Memory is almost always being actively used by your computer.


Related Questions

If the amount of food or resources available increases, the carrying capacity for an animal:

Answers

Answer: increases

Explanation:

The carrying capacity of an environment simply refers to the maximum population size of the species which the environment can sustain with the available resources such as food and water.

When the amount of food or resources available increases, then the carrying capacity for an animal: will increase as well. Assuming there's a reduction in resources, then there'll be reduction in carrying capacity.

First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".

Ex: If the input is 3 70 65 75, the output is:

70 reports.
65 reports.
75 reports.​

Answers

Answer:

The program in Python is as follows:

valCount = int(input())

reports = []

for i in range(valCount):

   num = int(input())

   reports.append(num)

   

for i in reports:

   print(i,"reports.")

Explanation:

This gets input for valCount

valCount = int(input())

This creates an empty list

reports = []

This gets valCount integer from the user

for i in range(valCount):

   num = int(input())

Each input is appended to the report list

   reports.append(num)

This iterates through the report list

for i in reports:

This prints each element of the report list followed by "reports."

   print(i,"reports.")

the position of an element in the periodic table depends on​

Answers

Answer:

Electrons

Explanation:

Hope it helps

What is self management​

Answers

Answer:

when you manage or construct something by yourself, taking full reponsiblity, etc

Explanation:

Yes will you do that to you and the kids and you can see do it in the morning or tomorrow

i got randomly logged out of discord and all my passwords arent working and i just got nitro yesterday for the first time help me what do i do-
for real pls help me

Answers

Answer:

See Explanation

Explanation:

Not having access to one's account can be frustrating. However, there are tips that can be followed to gain access to your account.

1. First, ensure that you entered the correct username and password.

By this, I mean that you enter the username/password the same way you set it.

As an example, iamaboy, Iamaboy iamAboy are different phrases because of the case disparity of i, I, a and A in the phrases.

Also, if you include digits and special character when creating your password; ensure that you include them in the right positons

2. If this still does not work, you may need to reset your password/username.

3. If after resetting your password/username, you couldn't gain access to your account, then you may need to contact discord through their customer support

Having difficulty accessing your discord account can be quite frustrating, but there are some useful tips you can follow to regain access.

How to regain access to your Discord account

1. Double-check that you have   entered the correct username and password.

It's important to ensure that youinput the same username and   password that you initially set up.

Pay attention to   any variations in capitalization or special characters, as they can make a difference.

2. If you are  still unable to access your account,you might consider resetting your password or username.

3. In the event   that resetting your password or username doesn't solve the problem, it may be necessary to reach out to sites customer support.

Learn more about discord :
https://brainly.com/question/32999869
#SPJ6

((GUITAR))
What is the letter name for the note shown above?

D
E
F
G

Answers

It is Letter G
Explanation: Took Guitar classes as a kid and memorized the letters.

A _____ movement tries to improve a part of society, usually through legal methods.

Answers

Answer:

Revisionary

Explanation:

When you start a new blank document, you begin typing at the

A. Center alignment
B. Right margin
C. Insertion point
D. Top alignment

Answers

C. The insertion poin

Which of the following would not be stored in a cell ?

A. Formula
B. Text
C. Number
D. Chart​

Answers

Answer:

D

Explanation:

Because you can put formulas, text and numbers into a salad, but you can not put a chart interrupt because it won't fit in a cell.

Select the correct answer. Dave uses a Windows operating system. He plans to host his blog on a web server. Which server software should Dave use?
А. Klone
B. Nginx
с. IIS
D. Apache HTTP​

Answers

Answer:

C. Linux

Explanation:

The kernel of the Linux and the utilities of the GNU are open and free of cost. One can directly download and install GNU/Linux without buying. Thousands of programs in software packages are available that can be easy to install without paying anything. There are many software programs, games in Linux that are free of cost and are open source that means anyone can download and install.  

Answer:

C - IIS

Explanation:

Just got this one right on Plato

____coping skills are instinctive.
A. All
B. No
C. Some

Answers

Answer:

Some of them

explanation:

Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, which protection does the hashing activity provide

Answers

Answer: Integrity

Explanation:

Based on the information given, it should be noted that the protection that the hashing activity provides is integrity. In cryptography, hashing is used in the verification of integrity.

To determine integrity, comparison can be made between data and a hash value. When data is hashed at a particular time, the hash value is protected. Then, to ensure integrity, the data can then be hashed again after which it'll be compared to the protected value.

Which of these tools is used to primarily create a wireframe?
OA.
Adobe PDF
OB.
Balsamiq
O c.
Microsoft Excel
OD.
Foxit

Answers

Answer:

B.

Explanation:

Balsamiq Mockups is a tool of Balsamiq Studios, which was created by Peldi Guilizzoni, in March 2008. It was designed to help software designers and developers build softwares.

So, the primary tool used to create a wireframe is Balsamiq mockups. With the help of Balsamiq Mockups software designers create rough sketches with the same speed that serves as a wireframe.

So, the correct answer is option B.

Summary of how I could use my Video Skills outside of school

Answers

Answer:

u can take videos of your journey

- enjoy the moment (like using videos in snap)

- you can record ur life

hope this helps

Answer:

you could make some videos for money

Explanation:

Which of the following type of software would be the MOST appropriate for showing information in tables and reports

Answers

Answer:  B) Database Software

Explanation:

Desktop Publishing software and Multimedia software is not used for storing data, so it can't be that. Spreadsheet software stores data in cells, while Database software stores data in tables.

17. What is data communication? * 1 point​

Answers

Answer:

The transfer and reception of data over a communication channel.

Explanation:

I don't know how to explain- :/

Hope it helps c:

HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol includes a status code returned by the server to tell the browser the status of its most recent page request. Some of the codes and their meanings are listed below: C++

200, OK (fulfilled)

403, forbidden

404, not found

500, server error

Given an int variable status, write a switch statement that prints out the appropriate label from the above list based on status.

I'm getting an error on this.

This is my code:


cout << "Enter a status";

cin >> status;

switch (status)

{

case 200:

break;

case 403:

break;

case 404:

break;

case 500:

break;

}

Answers

Answer:

the answer is your mind think and you will get it like me it's ()

fill in the blanks:-
Advanced, began
1)photoshop cc is the_______ version of adobe photoshop CS6.
2)To complete the selection, return to the spot where you__________ and release the mouse button.​

Answers

Answer:

we can talk here , and tell me about your self

A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications. You have launched the CloudHSM cluster but after just a few hours, a support staff mistakenly attempted to log in as the administrator three times using an invalid password in the Hardware Security Module. This has caused the HSM to be zeroized, which means that the encryption keys on it have been wiped. Unfortunately, you did not have a copy of the keys stored anywhere else.

How can you obtain a new copy of the keys that you have stored on Hardware Security Module?

Answers

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

so if brainly teaches me better why do we even have real life teachers??????

Answers

Answer:

i dont know maybe becuse the l.a.w says so?

Explanation:

In raft survival ocean nomad I was traveling and now I can’t enter the island or go back home to my raft please help me.

Answers

Answer:

Get an island scanner

Explanation:

This may help

3.1.1 What type of goods are car radio and remote control.​

Answers

Answer:

Radio Controlled cars .

Which of the following demonstrates how digital music are files played? An analog player changes the recording to digital, and sends the digital signal to a speaker to be played. A digital music player reads the file and plays the recording through a digital music speaker to be played. A digital music converter reads the file as analog and sends the signal to a speaker to be played. An analog converter changes the digital recording back to analog and sends the signal to a speaker to be played.

Answers

Answer:

An analog player changes the recording to digital, and sends the digital signal to a speaker to be played.

Explanation:

An audio signal can be defined as a representation of sound, either as an analog or digital signals.

An analog audio signal refers to a continuous signal that is represented by a changing level of quantity such as voltage with respect to time and sequence of bits such as 16kbps, 32kbps, 64kbps, 96kbps, 128kbps, 196kbps, and 320kbps.

Note: Kbps means kilobits per seconds.

On the other hand, a digital audio signal can be defined as the recording, storage and reproduction of sounds by encoding the audio signals in a digitized format.

An analog player is a type of audio player such as a turntable, which is designed to read informations as a continuous signal.

In order to play a digital audio or music files, an analog player changes the recording to a digital format and sends the digital signal to a speaker to be played.

A speaker can be defined as an electronic output device that is typically used for the conversion of an electromagnetic wave to sound wave.

Basically, this conversion is done through the help of a hardware electronic component known as transducers.

PLEASE HELP ILL MARK BRAINLIEST!!!
From which two international agreements do most nations derive their intellectual property laws?

Digital Millennium Copyright Act (DMCA)
Berne Convention
Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT IP or PIPA)
World Intellectual Property Organization (WIPO) Copyright Treaty
Stop Online Piracy Act (SOPA)

Answers

Answer:

I. Berne Convention.

II. World Intellectual Property Organization (WIPO) Copyright Treaty.

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

An intellectual property (IP) law can be defined as a legal framework and regulations that governs and protects an individual's or organization's intangible and innovative creation of the mind from unauthorized use by a third party. Thus, it is a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

The two international agreements from which most nations derive their intellectual property laws are the Berne Convention and World Intellectual Property Organization (WIPO) Copyright Treaty.

The Berne Convention is an international agreement governing copyright for the protection and equal treatment of literary and artistic works. It was signed into law on the 9th of September, 1886 in Berne, Switzerland and was adopted by eight (8) countries.

The World Intellectual Property Organization (WIPO) Copyright Treaty is an international agreement under the Berne Convention and it governs the protection of literary and artistic works, as well as the rights of authors. It was signed into law on the 20th of December, 1996.

Answer:

Berne Convention

World Intellectual Property Organization (WIPO) Copyright Treaty

Explanation:

I got it right on the Edmentum test.

The cafeteria is dark except for one light in the kitchen. The cafeteria manager is in there, counting lunch money. She says that there were some strangers in the school today and they ate lunch in the cafeteria.

Answers

Answer:

Explan

wha??! do u meana

Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a likely cause of the problem? *
1 point
the interface cable may be loose
the network adapter is malfunctioning
monitor may be in sleep/hibernate mode
the monitor controls are improperly adjusted

Answers

Answer : Monitor may be in sleep/hibernate mode.

It needs to be as simple as possible. Each question is slightly different.1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].Associate the list with the variable arith_prog.

Answers

Answer

can we get a picture of the problem ?

Explanation:

HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
A rock band is a type of

ensemble
metronome
time signature
treble clef

Answers

Answer:

ensemble I think I'm pretty sure

Answer:

ensemble

Explanation:

ensemble is a group of musicians who perform together.

We informally define the term corresponding element as follows: The first element and the last element of a list are corresponding elements. Similarly, the second element and the second last element are corresponding elements. The third element and the third last element are corresponding elements -- and so on. Given that the variable a is associated with a list, write an expression for the corresponding element of a[i].

Answers

Answer:

a[i] = a[len(a) - i - 1]

Explanation:

Based on the definition of corresponding elements above,

First element of a list and last element are corresponding :

Using this :

Given a list defined as 'a'

First element of list is at index 0

Last element of a list is at index ; len(a) - 1

For a list containing 10 elements:

Second element corresponds to second to the last element

Second element is at index 1;

Second to the Last element is at index 8

(since indexing starts from 0)

Second element = a[1]

Second to the last element = a[len(a) - i - 1]

Hence,

a[i] = a[len(a) - i - 1]

Let's apply: Interpret these electrical wiring plans. Write your answer in the answer sheet.

Answers

es itmage cnontinee tu espuestraa

Other Questions
how do sea breezes and land breezes affect local weather Forest fires can cause a secondary disturbance in an ecosystem what is a secondary disturbance Please help I need help in order to pass math Which of the following statements is true?A) All rhombuses are squares.B) All parallelograms are rectangles.C) All squares are rectangles.D) All rectangles are squares. Match the information given with the correct stage of labor: 1st (dilation), 2nd (expulsion), or 3rd (placental).1. Stage that has the onset of regular uterine contractions and dilation of the cervix___.2. Stage in which the cervix dilates to a diameter of about 10 cm____.3. The stage which commonly lasts 8-24 hours____.4. The stage in which the amniotic sac ruptures____.5. The stage in which the baby exits the vagina_____.6. The stage which commonly lasts from a few minutes to an hour____.7. The stage in which contraction of the woman's abdominal muscles assists the uterine contractions_____.8. The stage in which the placenta is expelled from the uterus_____. To what extent is Adam Clayton Powell effective in his call for a bipartisan approach to the political issues of his time? Make up a sentence. 1. his heroism 2. always 3. Mubariz Ibrahimov 4. people 5. remember 6. and 7. willSingle choice. (1 Point)A) 3,7,2,5,4,6,1B) 4,2,7,5,1,6,3C) 4,7,2,5,3,6,1D) 3,6,1,4,7,2,5 The procedure was awakened and taken to the recovery room in satisfactory condition. How should the HDS proceed? A person had $17,000 invested in to accounts One paying 7% simple interest And one paying 8% simple interest. How much was invested In each account if the interest rate after one year is $1356? 3eeeeeeeeeeeeeeeeeeeeeeeeeeeereeeee Find the value of x. I dont know how to do this. Please help me A server becomes ill with diarrhea in the middle of his shift at work.What should he do?eda. Ask to be assigned to dishwashingb. Report the symptom to the managerc. Wear single-use gloves when serving foodd. Wash his hands between each table served Which of the following are ways in which a society can become homogeneous?1.Ethnically2.Fiscally3.Culturally4.Religiously Two comets are 300 m apart. Onecomet has a mass of 80,000 kg. Theforce between them is1.48 x 10-6 N. What is the mass of theother comet?A) 25,000 kgB) 250 kgC) 3700 kgD) 500 kg A machine operates with the following production cycle: 34 minutes of setup, 70 minutes of production. While in production, the machine produces 3 parts per minute. What is the capacity of the machine in parts per minute Someone please help me with this question In GHI, h = 9.6 cm, g = 9.3 cm and G=109. Find all possible values of H, to the nearest 10th of a degree. Someone please help!!! I also posted other questions if you want more points!!! What happened at Appomattox Court House? Multiple Question I need help please