which memory can be removed from motherboard? RAM OR ROM?​

Answers

Answer 1

Answer:

RAM is random-access memory and it can be removed from the motherboard.

Feel free to mark as brainliest :D


Related Questions

brain of the computer system is called​

Answers

Answer:

central processing unit in short form CPU :)

Answer:

The Central Processing Unit(CPU)

Explanation:

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results.

Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.

it crashed a lot
it could only run one application at a time
it didn't use a pointing device
it provided a shell for MS-DOS

Answers

Answer:

it providrd a shell for MS-DOS

Explanation:

It basically was a shell to make MS-DOS different. MS-DOS was still the underlying operating system.

Complete the code.
import CSV
inFile = open('pets.txt', 'r')
myReader =
reader(inFile)
for item in myReader
print(item)

Answers

The complete Phyton code is given below:

Complete the code.

import CSV

inFile = open('pets.txt', 'r')

myReader =

reader(inFile)

for item in myReader

print(item)
exit()

What is a Phyton Code?

Phyton is a high-level, object-oriented programming language. It is easy to learn its syntax and reduces the cost of program maintenance.

In the code above, the last line exit() was included to complete the code and to signal to the computer that that is the end of the instruction.

Please see the link below for more about Python Program:

https://brainly.com/question/12684788

Answer:

cvs.reader(inFile)

Explanation:

What is the definition of WLAN​

Answers

Explanation:

A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.

WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.

stay safe healthy and happy.

…….. and ……...are called binary digits. (Computer Science)

Answers

Answer:

Explanation:

0 and 1 are called binary digits.

here is your answer..

Jack regularly uses a wireless connection to access various networks as he travels around the world running his fashion line. Jack is able to access these Wi-Fi networks by using what?

Answers

Answer:

A Virtual Private Network, VPN connection

Explanation:

Virtual Private Network, VPN, is connection from a device to the internet which is encrypted and protected whenever such networks is established including on public networks. When a VPN is used third parties will not easily track or eavesdrop on the network or traffic data from the connection

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

Please help
what do data communications transmit data through?

Answers

Answer:There are two methods used to transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at the same time over multiple channels.

Explanation:

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

different he launc.
in function are available with MS-Excel
Many​

Answers

functions are available with MS-Excel..

1.count and sum

2.cell references

3.data and Time

4.text

5.lookup and reference

6.finanical

7.round

8.array formula

What is the difference btween a microcontroller a mini computer?

Answers

Answer:Microcomputers and minicomputers may sound similar, but they are very different types of computers. Microcomputers usually refer to laptop or desktop PCs that you use in a typical household, whereas minicomputers, which were primarily used from 1960 to 1980, are generally larger, but have limited functionality and slower processors.

Minicomputers can be quite bulky. Just the CPU itself can weigh up to 90 pounds.

Minicomputers can be quite bulky. Just the CPU itself can weigh up to 90 pounds.Minis were designed to be less complex than mainframes but still provide multiple terminals for multiple users. However, many of these systems were still slower, had less memory and were unable to integrate into larger networks.

Minicomputers were primarily used for process control and performing financial and administrative tasks, such as word processing and accounting. Some machines were designed for medical laboratory and teaching aids.

Microcomputers are primarily used for word processing, managing databases or spreadsheets, graphics and general office applications.

Explanation:

hope it helps

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)

Answers

Answer:

The expression is:

if widthOfBox % widthOfBook != 0

Explanation:

Given

Variables:

(1) widthOfBox and

(2) widthOfBook

Required

Statement that checks if (1) is divisible by (2)

To do this, we make use of the modulo operator. This checks if (1) is divisible by 2

If the result of the operation is 0, then (1) can be divided by (2)

Else, (1) can not be divided by (2)

From the question, we need the statement to be true if the numbers are not divisible.

So, we make use of the not equal to operator alongside the modulo operator

Alvin has created a non-extensive site map of all the commonly visited pages of his website. What is such a site map called?

А. XML site map

B. simple site map

C. standard site map

D. HTML site map

E. advanced site map

Answers

Answer:

А. XML site map

Explanation:

Indeed, the XML site map is the modern term used to describe a non-extensive site map containing details such as the commonly visited pages of a website.

Alvin's XML site map would allow search engines to have a  record of commonly visited pages of his website.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production

post-production

development

distribution

Answers

Explanation:

There are five phases of film production and they include development, pre-production, production, post-production and distribution.

Answer:

pre-production

Explanation:

edg2021

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

Write a program to accept radius and find area of circle

Answers

Answer:

Change it however you'd like

Explanation:

from math import pi

def findArea(rad):

   return (rad**2) * pi

#test

print(f"Area of the circle: {findArea(5)}")

Answer:

the answer above me is correct

Explanation:

Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware programs clear out temporary Internet files uninstall unwanted apps

Answers

Answer:

Clear out any garbage file on the drive

Explanation:

Running the Disk Cleanup utility is a quick way to clear out temporary Internet files. Therefore option C is correct.

Running the Disk Cleanup utility is a quick and efficient way to clear out temporary files and unnecessary data from your computer's hard drive.

These files can accumulate over time from web browsing, software installations, and system updates, occupying valuable disk space and potentially slowing down your system.

The Disk Cleanup tool identifies and deletes temporary internet files, cached data, downloaded program files, and other unnecessary files, freeing up space and improving system performance.

However, it is important to note that Disk Cleanup does not defragment your hard drive (A), remove spyware programs (B), or uninstall unwanted apps (D), as these tasks require different tools or procedures.

Therefore option C is correct.

Know more about Disk Cleanup:

https://brainly.com/question/31937611

#SPJ6

what will happen to the tools and equipment, if it is not store propely?​

Answers

This question doesn’t make any sense I guess it will rust

Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.

Answers

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

You have a team member on a remote project who is not fluent in English and
sometimes struggles with conversation. What is the best way to
communicate with him or her in a project setting?
O A. Through email
B. Through instant messaging
C. Over the phone
D. Over a video calling application

Answers

Answer:

Through email

The best way to communicate with him or her in a project setting is Through email.

Why through email?

In communication, the parties involved needs to understand each other and as such comprehension is vital.

Note that The best way to communicate with him or her in a project setting is Through email as the other person can sit down and quieting digest the information.

Learn more about email from

https://brainly.com/question/24688558

#SPJ2

The control unit and arithmetic logic unit are part of which hardware component?
O A. Blu-ray disc
B.
ROM
O C.
monitor
D.
CPU
O E
RAM

Answers

Answer:

The control unit and arithmetic logic unit are part of which hardware component IS CPU

CPU IS THE ANSWER

Explanation:

Answer: The answer to your question is CPU

Explanation:

In the table below, identify the data type that would be most suitable for the second field.

Name Age Gender
Mary 22 female
Joe 24 male
Kate 21 female
Frank 20 male
A.
binary
B.
Boolean
C.
autonumber
D.
text
E.
number

Answers

Answer:

e num

Explanation:

Answer:

A

Explanation:

_______ and _______ are the logical statement.

Answers

True and false are the logical statements

can someone's answer this​

Answers

Answer:

See explanation

Explanation:

Required

The surface area of each shape

Triangle

[tex]Area = \frac{1}{2}bh[/tex]

[tex]b\to base; h \to height[/tex]

So:

[tex]Area = \frac{1}{2} * 23 * 21[/tex]

[tex]Area = 241.5m^2[/tex]

Square

[tex]Area = l^2[/tex]

[tex]l \to length[/tex]

So:

[tex]Area = 10^2[/tex]

[tex]Area = 100m^2[/tex]

Rhombus

[tex]Area =a^2\sin(\theta)[/tex]

[tex]a \to side\ length[/tex]

[tex]\theta \to any\ interior\ angle[/tex] (not given)

So:

[tex]Area =18^2\sin(\theta)[/tex]

[tex]Area =324\sin(\theta)[/tex]

Trapezium

[tex]Area = \frac{1}{2}(a + b)*h[/tex]

[tex]a,b \to parallel\ sides; h \to height[/tex]

So:

[tex]Area = \frac{1}{2}(18 + 23)*21[/tex]

[tex]Area = \frac{1}{2}*41*21[/tex]

[tex]Area = 430.5m^2[/tex]

Circle

[tex]Area = \frac{\pi d^2}{4}[/tex]

[tex]d \to diameter[/tex]

So:

[tex]Area = \frac{3.14 * 5^2}{4}[/tex]

[tex]Area = \frac{3.14 * 25}{4}[/tex]

[tex]Area = \frac{78.5}{4}[/tex]

[tex]Area = 19.625m^2[/tex]

Input the time in hours. Calculate and print the time in minutes and seconds. [I hr = 60 minutes]

Answers

Answer:

The program in Python is as follows:

hrs = float(input("Hours: "))

mins = 60 * hrs

print("Minutes: ",mins)

Explanation:

This prompts the user for hours

hrs = float(input("Hours: "))

This converts to minutes

mins = 60 * hrs

This prints the minutes equivalent

print("Minutes: ",mins)


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

Other Questions
Gametes contain how many copies of each chromosome? Nosotros___(correr)mucho. Select the error: tu comes los tacos. Isa y yo sacan fotos How does Gandhis opinion of the British people lend weight to his argument about British Colonial rule in India? why did researchers at the university of Antwerp study high speed videos of the black woodpecker Someone please help me out!! If a positively charged rod is brought near the knob of a positively charged electroscope, the leaves of the electroscope will...A) converge, onlyB) diverge, onlyC) first diverge, then convergeD) first converge, then diverge Transform plate boundaries are characterized by long faultlines and shallow earthquakes.O TrueO False Jaime needs to buy a new refrigerator for his apartment. He found what he needed for$1,300 at a well-known appliance store. The store is offering two options for Jaime tofinance the appliance:Option: A store credit card with a $1,500 limit:1) The credit card charges 16.5% annual interest rate2) The minimum monthly payment is $100 plus the monthlyfinance charge3) No down payment required4) The loan is expected to be paid off in 12 months to avoidadditional penaltiesOption II: The appliance store offers an installment loan for his purchase:Loan charges a simple interest rate of 12,5%2) Loan must be paid off in 12 equal payments to avoid penaltiesA $300 down payment is requiredA Which Option should Jaime choose if he wants the interest he pays to be assmall as possible? Vig compro un videojuego que tena un descuento de 60%y pago $39 cual es el precio original del videojuego Question 11 of 22A horse of mass 180 kg gallops at a speed of 8 m/s. What is the momentumof the horse?Answers 1440 22.58451955 ZnSO4 ++LINO, ---- Zn(NO3)2+Li,SO4Balanced equation Jim wants to buy an electric saw marked $98.00. If the salesperson offers him a discount of 15%, how much will he have to pay for the saw? Quadrilateral HIJK is similar to quadrilateral LMNO. Find the measure of side OL. Round your answer to the nearest tenth if necessary. Figures are not drawn to scale. If you reject a joint null hypothesis using the F-test in a multiple hypothesis setting, then: A) a series of t-tests may or may not give you the same conclusion. B) the regression is always significant. C) all of the hypotheses are always simultaneously rejected. D) the F-statistic must be negative. Answer: A Ella is building fruit baskets and is filling them with apples and oranges. She has 48 apples and 60 oranges, and wants to make sure each each fruit basket has the same number of apples and oranges with no fruit left over. Choose all options that can be used to make fruit baskets? Select all that apply. help me please thanks Please help!!!!!!! :3 Which event marks the end of the Cold War?A. The 1941 attack on Pearl HarborB. The 1991 collapse of the Soviet UnionC. The 1973 withdrawal of troops from VietnamO D. The 2001 attack on the World Trade Center In a couple of sentences or more, compare and contrast Buddhism and Hinduism. Evaluate: log279 I just need the answer