Random Access Memory and Read Only Memory are examples of ____________. -Technology

1 Answer

Answer :

Random Access Memory and Read Only Memory are examples ofPrimary Memory.

Related questions

Description : In Random Access Memory if current will be interrupted, data will not lost. -Technology

Last Answer : FalseRandom Access Memory (RAM) is a volatile memory, if current is interrupted, data will lost.

Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above

Last Answer : Answer : C

Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip

Last Answer : c. Read only memory chip

Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip d. All of above

Last Answer : c. Read only memory chip

Description : .............. is a type of memory circuitry that holds the computer’s start-up routine. (A) RIM (Read Initial Memory) (B) RAM (Random Access Memory) (C) ROM (Read Only Memory) (D) Cache Memory 

Last Answer : (C) ROM (Read Only Memory) 

Description : RAM stands for: a) Read Access Memory b) Random Access Memory c) Rewritable Access Memory d) None of These

Last Answer : b) Random Access Memory

Description : Separate Read/Write heads are required in which of these memory access schemes. 1) Random Access 2) Sequential Access 3) Direct Access 4) None of these

Last Answer : 4) None of these

Description : Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access 2 Sequential Access 3 Direct Access 4 None of these

Last Answer : 4 None of these

Description : In a computer, what does RAM stand for ? (1) Ready to Access Memory (2) Read At-a-time Memory (3) Random Access Memory (4) Readily Available Memory

Last Answer :  Random Access Memory

Description : ROM stands for Random Operation Memory. -Technology

Last Answer : FalseROM stands for Read Only Memory.

Description : ……… stands for Compact Disc Read Only Memory. -Technology

Last Answer : CD-ROMstands for Compact Disc Read Only Memory.

Description : ROM stands for: a) Read Operating Memory b) Random Oriented Memory c) Read Only Memory d) None of These

Last Answer : c) Read Only Memory

Description : What is random access memory ?

Last Answer : Random Access Memory ( RAM) RAM is a type of medium that stores computer data. Any type of data can be "accessed" from RAM , hence it is called random access memory. The term random refers ... for backup. RAM is small in terms of its physical size and the amount of information it contains.

Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method

Last Answer : Answer : A

Description : The first practical form of Random Access Memory was the __________ a) SSEM b) Cathode Ray Tube c) William’s Tube d) Thomas’s Tube

Last Answer : Answer: c Explanation: The first practical form of RAM was the William’s Tube made in 1947. It stored data as electrically charged spots on the face of a Cathode Ray Tube

Description : Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______ A. Random Access Memory B. Primary Memory C. Secondary Memory D. Virtual Memory

Last Answer : D. Virtual Memory

Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above

Last Answer : A. Random Access Memory

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : SDRAM stands for. a. System dynamic random access memory b. Synchronous dynamic random access memory c. Both d. None

Last Answer : b. Synchronous dynamic random access memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : What should be minimum requirement of random access memory (RAM) for internet access: a) 8 MB b) 16 MB c) 32 MB d) 64 MB

Last Answer : c) 32 MB

Description : What is another name for random-access memory (RAM)?

Last Answer : Read/write memory.

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : a. Random access memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method

Last Answer : a. Random access memory

Description : Random Access Memory (RAM), a form of computer storage, is a ............. memory. (A) Non-volatile (B) Volatile (C) Permanent (D) Secondary

Last Answer : Answer: B

Description : RAM means: (A) Random Access Memory (B) Rigid Access Memory (C) Rapid Access Memory (D) Revolving Access Memory

Last Answer : (A) Random Access Memory

Description : Which of the following is used for very high speed searching applications ? (1) Flash Memory (2) Content-addressable Memory (3) Dynamic Random Access Memory (4) Static Random Access Memory

Last Answer : Content-addressable Memory

Description : Which component is mainly responsible for doing calculation in computer ? (1) Random access memory (2) Control unit (3) Arithmetic logic unit (4) Hard disk

Last Answer : ALU (Arithmetic logic unit)

Description : CPU time, memory space are the examples of system resources. -Technology

Last Answer : TrueSystem resources include many resources such as CPU time, memory space, I/O address, DMA channel to alert the need of hardware and software.

Description : Write a Numpy program to create a 3x3 identity matrix, i.e. diagonal elements are 1, the rest are 0. Replace all 0 to random number from 10 to 20 -Technology

Last Answer : import numpy as nparray1=np.identity(3)print(array1)x=np.where(array1==0)for i in x:array1[x]=np.random.randint(low=10,high=20)print(array1)

Description : Write a Numpy program to create a 3x3 identity matrix, i.e. non diagonal elements are 1, the rest are 0. Replace all 0 to random number from 1 to 10 -Technology

Last Answer : import numpy as npZ = np.arange(9).reshape(3,3)print (Z)x=np.where((Z%2)==0)for i in x:Z[x]=np.random.randint(low=10,high=20)print(Z)

Description : ____________ is quite relevant in Modern Times :- a)Artificial Intelligence b) IoT C) Both a, and b. d) None of these -Technology

Last Answer : c) Both a and b

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error

Last Answer : B. burst error

Description : When camping how much civilization or technology should one have access to before it is no longer camping?

Last Answer : I swear I was at a campground once where a pizza was delivered to one of the campsites.

Description : A magnetic tape is a direct access storage device. -Technology

Last Answer : FalseIt is a non-volatile memory hence, it is not direcdy accessible by the CPU.

Description : How NUMBER and DATE/TIME type fields are different in Access? Give any one difference. -Technology

Last Answer : NUMBER data type contains numeric values, while DATE/TIME type field contains date and time values.

Description : Define the AutoNumber data type in MS_ Access. -Technology

Last Answer : AutoNumber data type starts with a number for the first record and it automatically increases the number by a set of amount for each record.

Description : What is database template? Give the description of five templates, used in Microsoft Access 2007. -Technology

Last Answer : A template is a complete tracking application with predefined tables, forms, reports, queries, macros, and relationships. Each template creates a complete end-to-end solution that you can use ... to create a projects tracking database to track multiple projects and assign tasks to different people.

Description : Which field properties are used in Office Access 2007? Give the purpose of each field property. -Technology

Last Answer : Field PropertiesAfter you create a field and set its data types, you can also set additional field properties. Setting field properties can give the database extra flexibility and functionality.Some ... control.Text, Memo, Number,Date/Time, Currency,AutoNumber, Yes/No, OLEObject, Hyperlink.

Description : Microsoft Access is an example of (a) Computer -Technology

Last Answer : (b) MS-Access is the DataBase Management System (DBMS) found in the Microsoft Office suite.

Description : When you define a field for a table, which of the following parameters do Access always consider optional? -Technology

Last Answer : (d) Description field of the table is optional, as it depends on the databasedesigner that he/she wants to describe a field or not.

Description : Microsoft Office Access 2007 includes a set of database ………… which are designed for specific business needs. -Technology

Last Answer : Microsoft Office Access 2007 includes a set of database templates which are designed for specific business needs.

Description : Which program do you need to write HTML code? (a) Spreadsheet (b) Access -Technology

Last Answer : (c) From the given options, Notepad is useful program to write HTML code.

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : ………….. is a visual desktop experience which provides an easy way to access desktop. -Technology

Last Answer : Aero is a visual desktop experience which provides an easy way to access desktop.

Description : A good way to safeguard access to your computer is to protect it. (a) Deadbolt -Technology

Last Answer : (d) Password is a good way to safeguard access to your computer to protect it.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : A good way to safeguard access to your computer is to _________ protect it. -Technology

Last Answer : A good way to safeguard access to your computer isPasswordto protect it.

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : ____________ is a type of non-volatile memory composed of a thin layer of material that can be easily magnetized in only one direction. A. Bubble memory B. RAM C. SRAM D. None of the Above

Last Answer : A. Bubble memory