u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer 1

Answer:

B

Explanation:

Dynamic Random-Access Memory


Related Questions

1. how did the prototype help you think about your idea?
2. what was frustrating about making a prototype?

Answers

[tex] \: \: \: \: \: [/tex]

1. how did the prototype help you think about your idea?

it can clarifies the things about the products as well as the user flow.

2. what was frustrating about making a prototype?

There may be too much variation in requirements.

hope it helps

[tex] \: \: \: \: \: \: [/tex]

What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don

Answers

Answer:

Changes the look and feel of the display

Explanation:

Because you don't change the data nor the values in the char

And it does not change the type of chart.

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

The command used to save a file for the first time and or to save a file with a new file name, location and formatT

Answers

cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

If you suspect cyber crime what do you u do?​

Answers

Answer:

Hey mate.....

Explanation:

This is ur answer.....

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Hope it helps!

Brainliest pls!

Follow me! :)

Answer:

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Explanation:

is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.

Answers

Answer:

Telemedicine refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other. Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.

Explanation:

Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like

Answers

It uses network usage monitoring software to know the level of traffic on that local network.

We can arrive at this answer because:

Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.

To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.

More information:

https://brainly.com/question/8118353

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

What are the revised versions of water grinding mill and horse cart

Answers

What are the revised versions of water grinding mill and horse cart

ANSWER

A watermill or water mill is a mill that uses hydropower.

It is a structure that uses a water wheel or water turbine to drive a mechanical process such as milling (grinding), rolling, or hammering. Such processes are needed in the production of many material goods, including flour, lumber, paper, textiles, and many metal products.

These watermills may comprise gristmills, sawmills, paper mills, textile mills, hammermills, trip hammering mills, rolling mills, wire drawing mills.

which of the following are benefits of designing a scalable system? choose 3 options.

-guaranteed systems access for all users

- users may never know that a site has experienced tremendous growth

- ability to respond to user volume issues more quickly

- system will never need to grow again

-ability to maintain a high level of service for customers ​

Answers

I asked my brother since he’s kinda of tech geek and he said

The 1st, 3rd, and 5th answers are correct

Hope this helps and I hope my brother is not wrong.

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

Which career path involves working directly with computer networks?

Answers

The career path involves working directly with computer networks are analyst, network manager, and data analyst.

What are Networking?

Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.

Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.

Read more about the networking :

https://brainly.com/question/1027666

#SPJ1

Answer: Computer systems administrator

Explanation:

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.

Answers

Answer:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

# num 2 #

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

# num 3 #

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

# num 4 #

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

# num 5 #

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

# num 6 #

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

Explanation:

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

See more about python at brainly.com/question/13437928

which of these is not enumerated as a motivation to create accessible web content?

Answers

Answer:

Which of what?

Explanation:

From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes.

Answers

Answer:

From a data modeling point of view, time-variant data refer to data whose values change over time and for which one must keep a history of the data changes.

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

Lists can not hold strings and numbers in the same list.
True
False

Answers

i think it is false??

When worksheets are grouped together you can change and create consistent _______ in all of the worksheets.

Answers

When worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets.

It should be noted that if an individual group a set of worksheets, then any changes that is made in the worksheet will have an impact on the other worksheet.

Therefore, when worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets. For example, if an individual wants to create a standard table, grouping them can help save the user a lot of time.

Read related link on:

https://brainly.com/question/25612069

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

It is most commonly used for self-running presentations.
A. Slide Transition
B. Hyperlink
C. Action Buttons
D. Animation​

Answers

Answer:slides

Explanation: because in the slide you can make a presentation

a ____________ is the intersection of a column and row in an excel spreadsheet.

Answers

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

What in a database table is an item of information with some characteristics?

Answers

Answer:

Attributes describe the characteristics or properties of an entity in a database table. An entity in a database table is defined with the ‘fixed’ set of attributes. For example, if we have to define a student entity then we can define it with the set of attributes like roll number, name, course.

Explanation:

CAN I GET BRAINLIEST

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Other Questions
Why were southern political officeholders likely to be slave owners? Research evidence suggests that happiness depends more on __________ factors than on __________ factors. Do you feel like you've lived this same day many times before? On his bike, Jason can travel 8 miles in 50 minutes.At this rate, how far can Jason travel in 150 minutes. how do blind people wipe who is the European to leave India in a order wise. The gated channels that respond to physical distortion of the membrane surface are called ________. These channels are important in ________. What's the purpose of a curtain drain? After a suspected concussion, how long should one wait to take the impact test? Question 3(Multiple Choice Worth 1 points)(03.01 MC) Read the text and the question and choose the right answer.If you love eating carbs and can't get enough of rice or potatoes, then this Spanish-speaking country is just for you! According to a recent government survey, their citizens prefer grains more than any other food group.Based on what you learned from this lesson, which country should you visit if you love carbs? Colombia Panama Honduras Nicaragua -8, -11, -14, -17, -20, ...Find the 30th term of this Arithmetic Sequence. why did nepal adopt anti-british policy Does the Constitution create an equal government? pls help would it be A or B? what was the main struggle the main character was dealing with in his life in the play fences The Battle of Gettysburg...a) was not as terrible of a battle as Ft. Sumter had been.b) gave General Pickett his greatest military victory.c) allowed Lincoln to announce the nation should have a new birth of freedom.d) delivered to the Union control of the entire Mississippi River. Dangers of using a cell phone while operating a vehicle. The cell phone is a unique example of how one object can cause multiple distractions. In complete sentences, please explain how using a cell phone while driving can be an example of all four distractions. (at least 5 sentence) What is an ellipse? I want an accurate answer. No spam. Mona needs to photocopy a 14.5 centimeters wide by 15 centimeters long picture. She wants to enlarge the picture so that its length will be 45 centimeters. How wide will the enlarged picture be? 46.6 cm 43.5 cm 135 cm 44.5 cm Which statement describes electromagnetic waves with wavelengths grater than 700 nanometers