Compare volatile and nonvolatile devices. Which one would be better for long-term data storage?

Volatile, because it can only be accessed by those with a password

Volatile, because the data is lost once the computer is turned off

Nonvolatile, because the data is not lost once the computer is turned off

Nonvolatile, because it is less likely to become corrupted

Answers

Answer 1
The answe is
Nonvolatile, because the data is not lost once the computer is turned off 

Nonvolatile memory = your hard drive
Volatile memory = RAM inside the computer. This memory is wiped when the computer shuts down and starts back up.
Answer 2

Answer:

Nonvolatile because the data is not lost once the computer is turned off

Explanation:

For long term storage purpose it is essential to use the Nonvolatile device because Data stored in it is not lost once the system is turned off. while Volatile devices tend to loss data stored in them once the system is turned off.

Volatile devices are better used when high speed data access is required while nonvolatile devices are used for longer -term data storage purposes examples of nonvolatile devices includes: hard disks, re-writable optical disks. and  a common example of volatile device is RAM.


Related Questions

What are the risks of logging into a system routing as “root” or some other administrative identity?

Answers

"Root" in Linus is the the same as Administrator in Windows.
When you log into a system with identity "root" this means that you have administrative privileges (you are not simple user of the system and application). The risk is that as a "Root" you have the authority to make changes in the system and maybe harm the system if you don't know exactly what you are doing.

____________ is a balance between image file size and image resolution and is critical for maximizing image quality and download speed.
Question 22 options:

A) Optimal Size


B)Optimization


C) Physical Size


D) PPI

I think it's either A or B

Answers

Answer is (D) Optimal Size and Optimization are balance between image file size and image resolution and is critical for maximizing image quality and download speed. Mostly in optimal size are correct image is clear quality and fast download.

Your motherboard supports dual channeling and you currently have two slots used in channel a on the board; each module holds 1 gb. you want to install an additional 1 gb of ram. will your system run faster if you install two 512 mb dimms or one 1 gb dimm? explain your answer.

Answers

The system will run faster if you install two DIMMs because dual channeling can be used if both Channel B slots are filled. Dual channeling is faster than single channeling.

If the motherboard of a computer supports dual channel and have two slots, then The system will run faster if you install two DIMMs because dual channeling can be used if both Channel B slots.

what is computer ?

Computers is the device which are used in many sectors like banking, medicine, finance and education and especially the growth and application of  artificial intelligence by using computers can blur the distance between man and machine.

computer can store and processes the  information electronically and come in different option, sizes and grades of functionalities.

Computer systems consist of two parts such as hardware and software. The hardware is an electronic circuit which helps to compute the mathematical computations, and the software.

Software can be operated by hardware which is the second part  further subdivided into two parts, the operating systems and applications programs where the operating system runs the computer hardware.

For more details regarding computer, visit

brainly.com/question/21474169

#SPJ2

Salting techniques were used to create complex user ids!
a. True
b. False

Answers

That statement is true
Compared with other techniques, salting techniques will always resulted in stronger user passwords. Salting techniques will add a random string to the user entered a password and then hash the resulting string. So even though there are 2 users with the same password, the hash for each account will be different

Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be putting many miles on his vehicle. What’s the best transportation option for Jim?

Answers

The best transportation option for Jim would be to Lease the car.

What is the key distribution problem of the symmetric (secret) key encryption?

Answers

When encrypting content with a symmetric key, the receiving party needs to have this key in order to decrypt. However, there is a fundamental problem that the key itself cannot be easily shared with the receiver over an unsafe channel, where attackers could eavesdrop and capture it as well.

The solution for this is either to use asymmetric key encryption, or to use a key exchange algorithm such as the one devised by Diffie-Hellman.

​to add notes or comments, insert a comment tag using the syntax _____.

Answers

The needed syntax would be:
<!--comment-->
Hope I could be of assistance! ;)

Answer:

<!--type your comment-->

Procedure:

First, add an arrow pointing left.

Second, next to the arrow, add an exclamation mark

Third, next to the exclamation mark, add two dashes . Please not that if you get the dashes wrong it will not display properly.

Then, add your comment

Lastly, close with 2 dashes with an arrow pointed right.

Add pictures using the _______ tab.
a. insert
b. layout
c. home
d. design

Answers

A) insert
is the best answer out of the answers. Hope this helps! 

Regardless of whether you are using a Microsoft Word or PowerPoint, if you are planning to add pictures to your presentation or document, you should click on the (A) insert tab.

In Microsoft PowerPoint, you can click Pictures and choose the picture you’d like to add from your computer, and in Microsoft Word you do the same thing and get the same results. The layout tab is only available on Microsoft Word while the design and home tab are available in both.

Create a static method called findlargest, which takes an array of integers as an input parameter and returns the array index of the largest integer in the array. if there are positions that are tied for largest, the method should return the first index with a largest value.

Answers

public static int findlargest( int[] theArray )
{
    int index = 0;
    int maxVal = 0;
    for( int i = 0; i < theArray.length; i++ )
    {
        if( theArray[ i ] > maxVal )
        {
            maxVal = theArray[ i ];
            index = i;
        }
    }
    return( index );
}

A ________ is a connection point that is used to attach peripheral devices to the motherboard.

Answers

The point is called "Port".

In a PC there are two kinds of ports usually, internal and external. Both are used to as connection points to connect various devices to PC. Internal port can be used to connect devices such as HDD, CD/DVD ROMs etc while external are used for flash drives, printers and such kind of devices.

What are the benefits of using a multiview sketch to communicate a design?

Answers

There are three dimensions of an object-- the top, the front, and the side views. A Multiview sketch shows two or three views of an object. Multiview sketch gives the shape description of the object. It also serves as the main form of communication between manufacturers and sketchers. 

What can geographers map with remotely sensed data?

Answers

Geographers can map for example the topography of the earth's surface using aerial photographs taken from a plane flying on regular flight paths at known altitudes. A topographic map with regular contour intervals and also showing infrastructure like roads and buildings can be created from this. Also, the LIDAR system can show features not observable on the ground by 'seeing' into the subsurface and detecting buried escarpments, trenches etc. 

Assume that name has been declared suitably for storing names (like "amy" , "fritz" and "moustafa") write some code that reads a value into name then prints the message "greetings, name! ! !" where name is replaced the value that was read into name. for example, if your code read in "hassan" it would print out "greetings, hassan! ! !". **please ignore the spaces between the exclamation marks( ! ! ! )**

Answers

name = "Bob"
# or you can prompt the user to enter their name:
# name = input("What's your name? ")

print("greetings," , name)

Which of the following is not considered as part of technology literacy?

A. Managing the environment B.accessing data C. Using technology D. A GPS locator

Answers

Managing the environment is not considered as part of technology literacy.

What is the technology literacy?

A person's capacity to assess, convey, develop and knowledge in a totally digital environment is referred to as technology literacy. It also considers the GPS locator.

Technology literacy is the examination of technology that permits students to learn about the processes and information associated with technology that are required to solve issues and expand human capabilities.

Therefore, option A is correct.

Learn more about the Technology literacy, refer to:

https://brainly.com/question/19037232

#SPJ2

Final answer:

A GPS locator is not considered part of technology literacy, which encompasses the ability to use, manage, understand, and assess technology broadly.

Explanation:

Out of the options provided, D. A GPS locator is not typically considered part of technology literacy. Technology literacy usually refers to the competence to use, manage, understand, and assess technology, which includes tasks like accessing data, using technology effectively, and managing digital environments.

A GPS locator is a tool or device that uses Global Positioning System technology to determine precise locations; it is not inherently a skill or literacy but rather a type of technology one might learn to use proficiently. Technology literacy is broader and refers to comprehensive knowledge and capabilities relating to digital devices and environments, not just the ability to use a specific type of device.

If you use a c++ key word as an identifier, your program will:

Answers

Should refuse to compile. Probably with a syntax error.

An array created during the execution of a program is called a ____ array.

Answers

probably dynamic since it was created dynamically.

Undefined function 'symsum' for input arguments of type 'double'.

Answers

the correct form is whom is thsi

The mass percent of hydrogen in CH₄O is 12.5%.Mass percent is the mass of the element divided by the mass of the compound or solute.

What is the mass percent?

Mass percent is the mass of the element divided by the mass of the compound or solute.

Step 1: Calculate the mass of the compound.

mCH₄O = 1 mC + 4 mH + 1 mO = 1 (12.01 amu) + 4 (1.00 amu) + 1 (16.00 amu) = 32.01 amu

Step 2: Calculate the mass of hydrogen in the compound.

mH in mCH₄O = 4 mH = 4 (1.00 amu) = 4.00 amu

Step 3: Calculate the mass percent of hydrogen in the compound.

%H = (mH in mCH₄O / mCH₄O) × 100%

%H = 4.00 amu / 32.01 amu × 100% = 12.5%

The mass percent of hydrogen in CH₄O is 12.5%.

CO2 = 1.580 grams H2O = 0.592 grams Lookup the molar mass of each element in the compound Carbon = 12.0107 Hydrogen = 1.00794 Oxygen = 15.999 Calculate the molar mass of CH4O by adding the total masses of each element used. 12.0107 + 4 * 1.00794 + 15.999 = 32.04146 Now calculate how many moles of CH4O you have by dividing by the molar mass. m = 1.15 g / 32.04146 g/mole = 0.035891 mole Now figure out how many moles of carbon and hydrogen you have. Carbon = 0.035891 moles Hydrogen = 0.035891 moles *

Therefore, The mass percent of hydrogen in CH₄O is 12.5%.

Learn more about mass percent here:

https://brainly.com/question/5295222

#SPJ5

Which of the following is normally a feature of an operating system for personal computers?a. All of these are normal features of an operating system
b. Manage users and access rights
c. Support connections to networks
d. Allow multiple applications to share the computer hardware resources

Answers

I think it shhould be A

The correct option is A - All of these are normal features of an operating system. An operating system manages users and access rights, supports network connections, and allows multiple applications to share computer hardware resources. Thus, all the listed features are typical of an operating system.

An operating system (OS) is essential software that manages computer hardware and software resources and provides common services for computer programs. Among its primary features for personal computers are:

Managing users and access rights: This ensures that different users have appropriate permissions to access files and programs.Supporting connections to networks: This allows the computer to connect and interface with other systems over networks like the internet.Allowing multiple applications to share the computer hardware resources: This enables several programs to run simultaneously without one monopolizing the system's CPU or memory.

Therefore, the correct answer is that all of these are normal features of an operating system(Option a).

What three things must a motorist carry with them while driving a motor vehicle?

Answers

Three things motorists have to carry are:
A valid driver license
Permit
Provisional license
Insurance
and
vehicle registration cards

You can use this method to determine whether a file exists.

Answers

The File Class's Exist Method

When using a calculator, be sure you press ____ first?

Answers

The answer to this question is: CE
Calculator will memorize the input that you made from previous calculation until you press the = button.
CE stands for clear data, which means that by pressing this, you will eliminate the calculation from previous effort and start the new calculation on a blank state
CE Is the answer hope it helps u

Using ______, a smartphone can connect to an automobile audio/control system

Answers

Using bluetooth, a smartphone can connect to an automobile audio/control system

How can public-key encryption be used to distribute a secret key?

Answers

If you encrypt the secret key with someone else's public key, then only that person can decrypt it with his private key. The encrypted content can be freely shared with anyone, however only the intended recipient can retrieve the secret key since he is the only one with the proper private key.

A device that is connected to a network that is identified by a unique number and works as an individual part of the network is called a

Answers

cellular phone? I'm pretty sure

Alphabet for your reference: a b c d e f g h i j k l m n o p q r s t u v w x y z if the code for cat is ecv what is the code for dog

Answers

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
Cat = Ecv
C = E
A = C
T = V
Regular alphabet shift 2 to the right, so A = C and so forth
D = F
O = Q
G = I
Dog = Fqi

By comparing the letters in 'cat' and their coded form 'ecv,' we find a pattern of shifting each letter by +2 positions in the alphabet. Applying this pattern to 'dog,' we get 'fqi' as the coded form.

To decipher the code for 'dog,' let's analyze the code provided for 'cat' which is 'ecv.'

We’ll determine the pattern by comparing the letters:

'c' to 'e': 'c' is the 3rd letter, 'e' is the 5th letter. The difference is +2.'a' to 'c': 'a' is the 1st letter, 'c' is the 3rd letter. The difference is +2.'t' to 'v': 't' is the 20th letter, 'v' is the 22nd letter. The difference is +2.

The pattern is shifting each letter in 'cat' by +2 positions in the alphabet to get 'ecv.'

Now, apply the same pattern to 'dog':

'd' (4th letter) + 2 = 'f' (6th letter)'o' (15th letter) + 2 = 'q' (17th letter)'g' (7th letter) + 2 = 'i' (9th letter)

Therefore, the code for 'dog' is 'fqi.'

Jared does not update his computer’s system software. What threat does his computer face?
viruses
hackers
Trojan Horses
worms

Answers

the answer is not viruses it is actually hackers.

When you compile your program, the compiler identifies the logic errors and suggests how to correct them?

Answers

Nope. You're on your own to find them and fix them. This why testing is so important, otherwise they won't show up until the customer finds them and that's embarrasing.

If you have excellent reading,writing, and scientific literacy skills, you are said to have strong?

Answers

Answer:

Basic skills are the correct answer.

Explanation:

Basic skills are the skills of the person or individual by which they can get the excellent skills of reading, skills of writing, also the particular skills of literacy and other skills. It is that type of feeling of any person by which they can say that they have strong skills. That's why the following answer is true.

Answer:

D

Explanation:

Edge 2021

When you start to type =av, what feature displays a list of functions and defined names?

Answers

The feature displays a list of functions and defined name, but after you start to type = av and it will begin typing an formula. Formula AutoComplete is the defined name will come up in the screen. Formula AutoComplete is also called the word completion it is a feature that predicts the remaining part of the word a user is typing.
Final answer:

The autocomplete feature in spreadsheet programs provides a list of functions and defined names as you type, helping with data entry and formula creation.

Explanation:

When you begin to type =av in a spreadsheet program such as Microsoft Excel, you are activating the autocomplete feature. This feature displays a list of functions and defined names that match what you've started typing. It is particularly useful when entering functions for common calculations like SUM, COUNT, AVERAGE, MAX, or MIN. These functions can also be accessed via the AutoSum button, which is represented by the Greek sigma symbol on the Home tab in the ribbon of the program. When working with functions, whether through typing or the pointing method, it is essential to avoid circular reference errors by not referencing the active cell within its own formula.

Given an array declared to hold 100 values, the smallest index that can be used with the array is

Answers

In C influenced languages - 0.

Final answer:

The smallest index that can be used with the array is 0.

Explanation:

The smallest index that can be used with the array is 0.

When declaring an array, the index values start from 0 and go up to the length of the array minus 1. So, in this case, since the array has been declared to hold 100 values, the smallest index that can be used is 0. For example, if you want to access the first element in the array, you would use array[0].

Other Questions
What type of stretch is best included as part of a warm up "suppose that the dollar cost of producing x radios is c(x) = 200 + 10 x - 0.2 x 2 . find the average cost per radio of producing the first 30 radios" Slope for (6,-10) (-15,15) Vagrancy law in the 1860s applied to Which role did women most likely play in bringing dramatic change to hunter-gather societies?(A. Taming and herding animals.)(B. Building houses.)(C. Hunting animals for food.)(D. Planting and harvesting crops.) 243.875 round to the nearest hundred Why did Congress pass the Judiciary Act of 1789? Swinging a tennis racket against a ball is an example of a third class lever. true or false mile durkheims definitions, many feminists would say that 1950s housewives were more likely to commit the The Proclamation of 1763 called fora.settlers to move westward.c.a halt to westward expansion.b.a war.d.Native Americans to move west. Before many Greek city-states became democracies, most had strong rulers known as ________ State that borders a foreign country but does not border another state A(n)__________ would be found at the mouth of a river where fresh and salt water meet. What is the radius of a circle with circumference 27 in.? 1) This element has more than 50 but less than 75 protons and it is in Group 17.2)This element has more electrons than oxygen but fewer electrons than neon.3)This element has an atomic number lower than that of aluminun but an atomic mass that is greater than sodium. 4)This Group 2 element has fewer protons than bromine but more protons than sulfur.5)This element has an atomic number that is one greater than platinum. "early chinese civilizations developed along which two rivers in china?" Which three factors were part of European Imperialism Solve for p.3p 4 = 11p = 7p = -5p = 3 p = 5 You are ordering concert tickets. You pay a processing fee of $5, plus $18 per ticket. How many tickets can you buy for $100? Number 123,456,789 what digit has the greatest value? what is it value Steam Workshop Downloader