Which of the following is NOT a long-term storage device?
Compact disc
Flash drive
Hard disk
RAM
o following us E persistent memory chips to store data

Answers

Answer 1

The storage device which is not a long-term storage device is: D. RAM.

Types of computer memory.

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include the following;

Read only memory (ROM)Random access memory (RAM)

What is RAM?

RAM is an abbreviation for random access memory and it can be defined as a volatile and temporary storage (memory) location that is used for currently opened software program (application) and computer data.

In conclusion, we can reasonably and logically deduce that the storage device which is not a long-term storage device is random access memory (RAM).

Read more on RAM here: https://brainly.com/question/13748829

#SPJ1


Related Questions

i need random facts about bill gates.

Answers

He is the co founder of Microsoft

Which are examples of digital video? Choose all that apply.

video played from a reel and shown at a drive-in movie theater

video downloaded from a website and played on a portable electronic device

video streamed from a broadcast news website

video played from a DVD player

Answers

Answer:

B, C, D

Explanation:

Edge 2021

     Digital video is the electronic representation of moving pictures as digital data that has been encoded. Contrasted with this is analogue video, which uses analogue signals to represent moving pictures. Digital video is made up of numerous digital images that are shown quickly one after the other.

DV is a type of video format ?

       In order to transfer DV signals between devices, they are encoded into 80-byte blocks known as DV-DIF data (DV Digital Interface Format). These DV-DIF blocks can either be stored as raw files with the.dv or.dif extension or wrapped in other file formats like AVI, QuickTime, and MXF.

         A file produced by a digital camera and saved in a common raw format is known as a digital video (DV) file. Each Digital Interface Block (DIF) in a DV file contains 80 bytes. Audio, video, and metadata can all be found in DIF blocks.

      Who or what uses DV?  A group of video camera manufacturers led by Sony and Panasonic introduced the DV family of codecs and tape formats for digital video storage in 1995.

      DV(digital video) is one kind of video file captured by dv camera, mini dv, and digital 8.

      DV mode – what is it? A video standard called DV (Digital Video) was introduced in 1996. It was developed by a group of businesses and given the official designation IEC 61834. There are a number versions of the DV standard, including DVCAM (Sony) and DVCPRO (Panasonic). Customers are familiar with MiniDV, DV's smaller format.

To Learn more About  digital video (DV), Refer:

https://brainly.com/question/19554652

#SPJ2

Which type of security personnel may work for government as well as for private security agencies?

Which type of security personnel may work for government as well as for private security agencies?

Answers

Answer: A security guard

Explanation:

it’s a security guard.

Privacy principles need to be balanced against the
private information. Select 2 options.
O financial
ethical
O corporate
D societal
political
benefit that comes from the automated collection of

Privacy principles need to be balanced against theprivate information. Select 2 options.O financialethicalO

Answers

In the case above about Privacy principles, the balanced needs to be

Societal.

What does privacy mean?

The presence of informational privacy rights implies that people are said to be  under a duty or not to make known information or to hinder unauthorized use of their information by others.

Note that when Privacy principles is balanced against Societal benefit that comes from the automated collection of private information. , the world will be at peace.

Learn more about Privacy principles from

https://brainly.com/question/10524592

#SPJ1

You want to show a list of VLANs on your system. Which command would you use?

Answers

To show a list of VLANs on your system, you would use the command "show vlan" or "show vlan brief". This command displays the configured VLANs and their associated information.

All these above help determine the value of information and the content of information, as the information needs to be of high quality which is accurate, complete and  consistency along with unique, and has timeliness,

The information needs to be correctly and accurately monitored ad precisely defined and which depends on the type of information, it has to be in a given time frame with some reference attached to it, it has to be unique in terms of quality and has to be governed and protected by law.

Learn more about information here

https://brainly.com/question/13629038

#SPJ11

how can i star python for free as a 13 year old

Answers

Answer:

Learning to code can be a fun and rewarding experience, especially at an early age. Here are some steps below you can take to learn Python for free:

Step 1) Find resources:

Python may be learned via a variety of resources, including free tutorials, videos, and interactive activities.

Step 2) Select development environment:

To write and run Python code, you will need a development environment. Many options are available, including IDLE and code editors like Replit.

Step 3) Start basic:

Python is a high-level programming language that is made to be simple to understand and write. Start with learning the language's core grammar, like defining variables, loops, notes, or functions.

Step 4) Practice practice practice:

The greatest approach to learn how to code is to practice, just as with any other ability. Try to create modest programs that address straightforward issues before advancing to more complicated undertakings. There are several forums, communities, and resources that may assist you with the procedure. Keep in mind to enjoy yourself and be gentle with yourself as you learn. Although it can occasionally be difficult, learning to code is a tremendously rewarding and difficult skill. 

an access command that filters the records in a form based on one or more fields, or based on more than one value in the field.

Answers

To filter records in a form based on one or more fields or based on more than one value in a field, you can use the `WHERE` clause in an SQL query. Here's an example of an Access command that demonstrates this:

SELECT * FROM TableName

WHERE Field1 = 'Value1' AND Field2 = 'Value2' AND Field3 IN ('Value3', 'Value4')

Let's break down the command:

- `SELECT *` retrieves all columns (fields) from the specified table (`TableName`).

- `FROM TableName` specifies the table you want to query.

- `WHERE` is used to specify the filtering conditions.

- `Field1 = 'Value1'` filters records where `Field1` is equal to `'Value1'`.

- `AND` is used to combine multiple conditions.

- `Field2 = 'Value2'` filters records where `Field2` is equal to `'Value2'`.

- `Field3 IN ('Value3', 'Value4')` filters records where `Field3` is either `'Value3'` or `'Value4'`.

You can modify this command based on your specific table and field names, as well as the desired values to filter on. Remember to enclose string values in single quotes ('').

Note that this example assumes you're using SQL syntax in Access to filter records. Depending on the context or programming language you're using, the exact syntax may differ slightly, but the general approach remains the same.

Learn more about: Access Command - https://brainly.com/question/31236769

#SPJ11

define business systems​

Answers

A business system is a group of interdependent elements or tasks that meet a business objective. You should document every step for each business process or activity. Business activities consistently produce results. Strategizing how you complete these tasks can help streamline daily operations.

how do I open this thing? it is stuck​

how do I open this thing? it is stuck

Answers

Answer:

the little button

Explanation:

What can you do to control who interacts with you in the metaverse?

A. changing your profile setting to public

B. using tool such as mute, block, and report

C. sticking with the people you've meet before in the metaverse

D. checking in with people to make sure they are feeling good

Answers

One can control who interacts with you in the metaverse by using tool such as mute, block, and report. The correct option is B.

What is metaverse?

The metaverse is a fictional iteration of the Internet as a single, universal, and immersive virtual world made possible by the use of virtual reality and augmented reality headsets. A metaverse is a network of 3D virtual worlds centered on social connection.

Consider a virtual world in which people can live, work, shop, and interact with others from the comfort of their couch in the real world. This is referred to as the metaverse.

You can use tools like mute, block, and report to control who interacts with you in the metaverse.

Thus, the correct option is B.

For more details regarding metaverse, visit:

https://brainly.com/question/29340413

#SPJ1

you are analyzing data about the capitals of different countries. in your sql database, you have one column with the names of the countries and another column with the names of the capitals. what function can you use in your query to combine the countries and capitals into a new column?

Answers

A function you can use in your query to combine the countries and capitals into a new column is CONCAT.

What is SQL?

SQL is an abbreviation for structured query language and it can be defined as a domain-specific programming language that is designed and developed for the management and communication of various data that are saved in a relational or structured database.

What is query?

A query can be defined as a computational request for data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.

In database management, CONCAT is an abbreviation for concatenation and it simply refers to a function used in a structured query language for joining (combining) variable number of string arguments such as countries and capitals.

Read more on query here: brainly.com/question/27851066

#SPJ1

Complete Question:

You are analyzing data about the capitals of different countries. in your SQL database, you have one column with the names of the countries and another column with the names of the capitals. what function can you use in your query to combine the countries and capitals into a new column?

COMBINE

GROUP

JOIN

CONCAT

write any 6 applection areas of computer​

Answers

Answer:

any 6 applection areas of computer

1. Home

2.school

3.hospital

4. Bank

5.supermarket

6.airport

Discuss why mtv initially had a difficulty securing enough ads

Answers

The reason why MTV   initially had a difficulty securing enough ads was due to the focus on the wrong target audience.

Why is target audience important?

Identifying your audience enables your company to target marketing efforts and resources on the groups most likely to purchase from you. This way, you may generate company leads in an efficient and cost-effective manner.

A thorough grasp of your target audience may also aid in the improvement of your website's SEO ranking. Because you already know what your followers are interested in, you can conduct related keyword research and leverage the top search phrases to generate relevant content.

Learn more about target audience;
https://brainly.com/question/31192753
#SPJ4

Near field communication (NFC) is a set of standards used to establish communication between devices in very close proximity.
True or false?

Answers

True. Near Field Communication (NFC) is a set of standards that are used to establish communication between devices in very close proximity.

This is a true statement as Near Field Communication (NFC) is a set of short-range wireless technologies that allow communication between devices that are in close proximity, typically a few centimeters or less.The major aim of NFC technology is to create an easy, secure, and swift communication platform between electronic devices. Communication takes place when two NFC-enabled devices come into close contact, which is usually a few centimeters or less. Near field communication uses magnetic field induction to enable communication between two devices.

In order for Near field communication to work, both devices must be within range and have Near field communication capabilities. NFC is being used in a variety of applications, including mobile payments, access control, and data transfer between two NFC devices. It has become a popular means of transmitting information between mobile devices due to its security and convenience.

To know more about devices visit :

https://brainly.com/question/11599959

#SPJ11

(b) a computer scientist claims that the mean speed is the same for both processors. does the confidence level contradict this claim?

Answers

To determine whether the confidence level contradicts the claim that the mean speed is the same for both processors, we would need to look at the confidence interval calculated from the sample data.

If the confidence interval for the difference in means between the two processors includes zero, then we cannot reject the null hypothesis that the mean speeds are equal. In this case, the computer scientist's claim that the mean speed is the same for both processors would not be contradicted by the confidence level.

However, if the confidence interval for the difference in means does not include zero, then we can reject the null hypothesis and conclude that the mean speeds are statistically different. In this case, the computer scientist's claim would be contradicted by the confidence level.

Therefore, without knowing the specific values of the sample data and the corresponding confidence interval, we cannot determine whether the confidence level contradicts the claim that the mean speed is the same for both processors

Learn more about sample data here:

https://brainly.com/question/29453029

#SPJ11

Which statement is true about mobile devices and your personal information?

A Mobile devices are expensive and can be bought and sold in many locations.
B Mobile devices must be protected because they contain private information about the owner.
C Mobile devices cannot be lost or stolen so your information is secure in them.
D Mobile devices are safe for storing any important information because they can be locked with a password.

Answers

Answer:

B Mobile devices must be protected because they contain private information about the owner.

Explanation:

B is correct because people do need to keep their mobile device protected from people who want to take their information because a mobile can carry a lot of personal information about someone and if stolen, a person could potentially steal someone's identity. Answer A is not true because at some locations mobile devices can be very cheap. The answer is not C because mobile devices CAN be stolen because anyone could easily take your phone out of your hand and run away with it. The answer is not D because your phone could get a virus and in many cases the virus can easily steal all of your information with knowing or not knowing your password because it might be downloaded already into you device.

Identify and summarize the features of the Windows 7 backup utility.

Answers

Answer:it is slow

Explanation: slow

Answer:

IT can create a backup it can restore a backup and probably more

Explanation:

how many ones dose it take to get 9 tens

Answers

It takes 90 ones to get 9 tens
The answer would be 90:)

Explanation: there are 10 ones in one 10 so if you multiply 10 times 9 it’s 90

what is created once based on data that does not change? multiple choice question. A) Static report
B) Data report
C) Dynamic report

Answers

The correct option is A) Static report .A static report is created once based on data that does not change.

A static report refers to a document or presentation that is generated from a specific set of data at a particular point in time and remains unchanged thereafter. It is typically used to present historical or fixed information that does not require real-time updates. Static reports are commonly used in business, research, and other fields to summarize data, present findings, or communicate information to stakeholders.

Static reports are created by collecting and analyzing data, organizing it in a meaningful way, and then presenting the results in a report format. The data used in a static report is typically derived from sources such as surveys, databases, or historical records. Once the report is generated, it remains static and does not automatically update when new data becomes available.

These reports are valuable when there is a need to capture a snapshot of information or analyze historical trends. They can be shared electronically or in printed form, providing a reference point for decision-making or documentation purposes. However, it is important to note that static reports may become outdated as new data emerges, and they may require periodic updates or revisions to remain relevant.Therefore, correct option is A) Static report.

Learn more about static reports

brainly.com/question/32111236

#SPJ11

in the lab, we used the reboot command to reboot the system. what runlevel does the reboot command corresponds to?

Answers

Essentially, the term "runlevel" means "The machine is at a known level of configuration." The machine will operate from level 0 to 6 as it boots.

Runlevel 0 is powered off and Runlevel 6 is rebooted. Use the Date option to enter a new date or time. The Adjust parameter can be used to define a change interval. Linux employs special characters or symbols called metacharacters that provide a shell command more significance in terms of file search and command connection. On Linux, the metacharacters are useful for listing, deleting, and copying files. The system date and time are shown with the date command. The date command can also be used to set the system's time and date.

Learn more about command here-

https://brainly.com/question/18955190

#SPJ4

Python question 4.2: Question 2

Python question 4.2: Question 2

Answers

Answer:

n=1

while True:  

   i=input("What pet do you have? ")

   if i=="rock":

       break

   else:

       print("You have a " + i + " with a total of " + str(n) + " pet(s)")

       n=n+1

Convert the folllowing binary number to decimal:00101

Answers

Answer:

5

Explanation:

Each digit in binary is worth double the amount compared to the number to the right of it. This means the rightmost number is 1, the second rightmost is 2, the third rightmost is 4, and so on.

If a digit has a 1 in the place, you add however much it is worth to the decimal count.

For example, this number has a 1 in the third rightmost. The third place here means a 4, so we add 4 to the count. It also has a 1 in the rightmost place, so we add 1 to the count.

Any digit with 0 is simply there to hold the place and can be ignored.

A bit confusing but hopefully you understand

Convert the folllowing binary number to decimal:00101

How has social networking changed political communication?

Answers

When movement organizers can use social media to swiftly and efficiently convey information about upcoming events and political changes, organizing protest activities is made easier.

What is political communication research?

Social media, especially when it comes to political views, is a persuasive communication tool that commonly works to change or influence beliefs since there are so many ideas, thoughts, and opinions circulating on the social media platform.

The introduction of social media in the mid-2000s dramatically changed political communication in the United States because it allowed regular people, politicians, and thought leaders to publicly convey their ideas to sizable networks of like-minded people and engage with them.

It is simpler to organize protest activities when movement leaders can quickly and effectively disseminate information about impending occasions and political changes using social media.

With a focus on comprehending the historical and present state of technological developments, PEC (Political Economy of Communications) analyzes the power relations between the mass media system, information and communications technologies (ICTs), and the larger socioeconomic structure in which these operate.

To learn more about political communication refer to:

https://brainly.com/question/2499229

#SPJ4

There is no ability to check or monitor if your email address was found on the dark web.
a. True
b. False

Answers

The statement " There is no ability to check or monitor if your email address was found on the dark web" is True.

What is the web?

The World Wide Web, or simply "the Web," is an information system that enables users to access papers and other web resources over the Internet. Through web servers, which can be accessed by software like web browsers, documents and downloadable media are made available to the network. Not just scientists had access to the internet before the advent of the world wide web. It unified the globe in a way that facilitated communication, sharing, and information access for everyone. The World Wide Web, sometimes known as the Web, the WWW, or just the Web, is a network of open websites that may be accessed online. The Web is not synonymous with the Internet: it is one of many applications created on top of the Internet.

To learn more about the web, use the link given
https://brainly.com/question/13211964
#SPJ4

In a function name, what should you use between words instead of whitespaces?
A. The asterisk symbol *
B. The octothorp symbol #
C. The underscore symbol
D. The quotation mark symbol"
Please select the best answer from the choices provided

Answers

Answer:

The underscore symbol

Explanation:

Because underscore symbol is allowed in naming rules

when an object is dynamically allocated via a pointer. the traditional variables that make up the properties of that class are still allocated via the stack. only other things in the object that are dynamically allocated are on the heap. group of answer choices true false

Answers

False. When an object is dynamically allocated via a pointer, all its properties, including those traditionally allocated on the stack, are also allocated on the heap.

This statement is false. When an object is dynamically allocated via a pointer, the entire object, including all its properties, is allocated on the heap. The traditional variables that make up the properties of the class are not allocated on the stack, but rather within the allocated memory block on the heap. It is important to note that dynamically allocated memory on the heap must be manually deallocated using delete or delete[] when it is no longer needed to avoid memory leaks, whereas stack-allocated memory is automatically deallocated when the function call ends.

Learn more about When an object is dynamically allocated here:

https://brainly.com/question/30002137

#SPJ11

what is the best combos for Nix in Brawlhalla (PS4)?​

Answers

I have never played the game but chose the good ones.

Answer:

sycthe is simple. Do down light and then turn them around. Then do chase dodge to neutral air. its an infinite combo

Explanation:

Complete the sentence.
Privacy is about having
blank
our personal data.

Answers

Privacy is about having control over our personal data.

Answer:

Privacy is about keeping our personal information

___confidential___

Explanation:

Correct on Edge2023

I know this is a different question on the quiz, but it's hard to find answers to these sometimes, so I hope this makes your day a little bit easier. Happy learning!

Miriam recently lost a considerable amount of weight. Her heart races when she gets on the bus for school, and she gets frequent headaches. Her mind is constantly focused on negative thoughts about school.

Miriam’s symptoms are signs that she should seek professional help for which mental health condition?

apathy
anxiety
sensitivity
impulsiveness

Answers

The answer would be anxiety

Answer: B

Explanation:

make an internet research on different hazards and risk​

Answers

Answer:

As internet use is extending to younger children, there is an increasing need for research focus on the risks young users are experiencing, as well as the opportunities, and how they should cope. With expert contributions from diverse disciplines and a uniquely cross-national breadth, this timely book examines the prospect of enhanced opportunities for learning, creativity and communication set against the fear of cyberbullying, p*rnography and invaded privacy by both strangers and peers. Based on an impressive in-depth survey of 25,000 children carried out by the EU Kids Online network, it offers wholly new findings that extend previous research and counter both the optimistic and the pessimistic hype. It argues that, in the main, children are gaining the digital skills, coping strategies and social support they need to navigate this fast-changing terrain. But it also identifies the struggles they encounter, pinpointing those for whom harm can follow from risky online encounters. Each chapter presents new findings and analyses to inform both researchers and students in the social sciences and policy makers in government, industry or child welfare who are working to enhance children's digital experiences.

Hazard is something with the opportunities to be harmful and the risk refers to the extent to which harm is likely to occur.

Many incidents are completely preventable, as well as the approach to doing just that would be to eliminate all potential dangers. Some objects are dangerous by nature, although some may be dangerous if handled wrongly as well as irresponsibly.

There are two kinds of hazards, such as:

Acute Hazard Chronic Hazard

The risk seems to be a fusion of various factors:

The actual likelihood that somehow a hazard might inflict damage.The severity of just that impairment.

Learn more about hazards here:

https://brainly.com/question/13084967

make an internet research on different hazards and risk
Other Questions
Ryan can use the mean, median, or mode to describe the average of his test scores.His scores are 62, 64, 93, 68, and 93.Which of the following statements is false?The median is greater than the mean.The mean is less than the mode.The mode is greater than the range.The range is less than the mean. On the pension worksheet, the actual return on plan assets will result in a debit to ____________ and a credit to ________________. Total cost. A drink costs 2 dollars. A taco costs 3 dollars. Given the number of each, compute total cost and assign totalCost with the result. Ex: 4 drinks and 6 tacos yields totalCost of 26. 354538.2392630.qx3zqy7 1 test passed All tests passed 1 import java.util.Scanner; 2 3 public class ComputingTotalcost { 4 public static void main(String[] args) { 5 Scanner scnr = new Scanner(System.in); 6 7 int numDrinks; 8 int numTacos; 9 int totalCost; 10 11 numDrinks = scnr.nextInt(); 12 numTacos scnr.nextInt(); 13 14 V* Your solution goes here */ 15 16 System.out.print("Total cost: "); 17 System.out.println(totalcost); 18 Can somebody please help me!!!! Read the passage from "Introduction to the Holocaust.In 1933, the Jewish population of Europe stood at over nine million. Most European Jews lived in countries that Nazi Germany would occupy or influence during World War II. By 1945, the Germans and their collaborators killed nearly two out of every three European Jews as part of the "Final Solution, the Nazi policy to murder the Jews of Europe.Although Jews, whom the Nazis deemed a priority danger to Germany, were the primary victims of Nazi racism, other victims included some 200,000 Roma (Gypsies). At least 200,000 mentally or physically disabled patients, mainly Germans, living in institutional settings, were murdered in the so-called Euthanasia Program.As Nazi tyranny spread across Europe, the Germans and their collaborators persecuted and murdered millions of other people. Between two and three million Soviet prisoners of war were murdered or died of starvation, disease, neglect, or maltreatment.Which statement does the evidence in the passage best support?Before the Holocaust, the Jewish population of Europe was over nine million.Many Jews lived in countries that Nazi Germany would occupy during World War II.The Nazis had a policy, called the Final Solution, to murder Jews who lived in Europe. The Holocaust was the systematic murder of people based on their race or their identity. Matilda recently took a statistics quiz in her math class. in one question, 45 of 900 visitors at a local craft show were surveyed about the cost of admission to the show. Matilda incorrectly stated that the sample in this situation was represented by 900 visitors at the craft show. a. what is Matilda's error?b. what is the actual sample? Fiscal policy includes all of the following except: a study by sociologist anthony j. cortese found that womenregardless of what they were doing in a particular adwere frequently shown in advertising as being: A ray of light in diamond (index of refraction 2.42) is incident on an interface with air. What is the largest angle the ray can make with the normal and not be totally reflected back into the diamond? oligopoly pricing strategy in wireless tv market ii. if the two firms in the cable tv market collude: Which of the following is the best definition of bias? an lrc series circuit has c= 4.80 f , l= 0.510 h , and source voltage amplitude v= 58.0 v . the source is operated at the resonance frequency of the circuit. Its a hot day and I hate my wife. Were playing Scrabble. Thats how bad it is. Im 42 years old, its a blistering hot Sunday afternoon and all I can think of to do with my life is to play Scrabble. I should be out, doing exercise, spending money, meeting people. I dont think Ive spoken to anyone except my wife since Thursday morning. All of the following words describe the feelings of the narrator EXCEPT: A. bitter B. angry C. apathetic D. miserable Five less than z is 4. I need help with this question (4x+3)5=2x/6 a body of mass 10.5 kg fell to the ground . calculate the weight of the body. Suppose you are planning for your retirement in 40 years time. You currently have $3,000 invested in a money market account and $5,000 in a share market fund. The money market account is estimated to earn an monthly return of 5.5% whereas the share market fund is expected to earn an monthly return of 12.5%. You plan to add $100 per month at the end of each month for the next 40 years to the money market account and $200 per month to the share market fund.When you retire, you plan to withdraw an equal amount for each of the next 30 years at the end of each month and have nothing left at the end (of 30 years after retirement). Additionally, when you retire you will transfer all amount from these two funds into a saving account that earns 3.25% annual rate of interest per year.I. Assuming the rates will remain as forecasted, how much can you withdraw each month when (and after) you retire? Show all steps, workings, and formula(s) clearly.II. Briefly explain the calculation steps and formulae used. Interpret and comment on your final answer. Does the final answer seem too large? Why or why not? You could use a simple example to illustrate your point. [Note: The discussion must be in your own words. Given a demand function p= 100-2q, find the revenue maximising quantity and the total revenue. which image is the translation of triangle ABC given by the translation rule (x,y) (x-2,y+3) The real GDP of Papaya country is 788 dollars, personal consumption expenditures are 414 dollars, gross investment is 81 dollars, government purchases are 283 dollars, and exports are 91 . Then, imports of Papaya country is dollars.