What is the difference between primary storage secondary storage and offline storage

Answers

Answer 1
Answer: . => Primary Storage – is a computer memory that connects directly to the central processing unit of CPU. It is also known as RAM or random access memory. This storage do not permanently stores data because this is a volatile kind of storage.
=> Secondary storage – this may refer to storage that is non-volatile. Some examples of this storage are hard drive, CD/DVD, Flash drive, etc
=> offline storage – also known as tertiary storage. This is not a very known storage, this includes jukeboxes and tape libraries.






Related Questions

You manage a single domain named widgets. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You would like to define a granular password policy for these users. Which tool should you use
You can probably use the 1040EZ form, as long as what is true? A. You own your own business. B. You are paying estimated tax. C. You have at least two dependents. D. You have no dependents.
Search engines enable you to:A. talk to people via the computer.B. locate Web pages related to a specific subject.C. connect to a better ISP.D. find and replace a certain item in Word.
A simple algorithm for handling requests works like this:________ a) all requests users make are stored. b) The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle. c) It is up to you how you design the algorithm.
Select the correct answer,Which unit of program code takes inputs, performs operations on these inputs, and returns the outputs?OAstatementОВ.variableOC.constantODfunction

true/false: if the last line in a file is not terminated with a \n, the readline method will return the line without a \n.

Answers

True, if the last line in a file is not terminated with a \n, the readline method will return the line without a \n.

In Python, the `readline()` method reads a single line from a file and returns it as a string. When the last line in a file is not terminated with a `\n` character, the `readline()` method will not recognize it as the end of the line and will return the line without the `\n` character. This occurs because the `readline()` method only reads up to the next `\n` character, and if it does not find one, it assumes that the line has not ended and includes the last line in its entirety. To avoid this issue, it is recommended to ensure that all lines in a file are terminated with a `\n` character, especially when using methods such as `readline()` to read the contents of the file.

Learn more about readline method here;

brainly.com/question/31603644

#SPJ11

Part BIdentify the storage formats of audio and video files. How do they differ from each other?

Answers

Answer:

uncompressed audio formats, such as WAV,AOFF AU, or raw header- less PCM;

Formats with lossless compression, such as FLAC Monkey's Audio extension.

You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click on a link to reset your password to the company’s website. You should proceed with caution because the email may be a(n) _______ attempt. A. spam B. phishing C. malware D. legitimate

Answers

B.) phishing
Definition of phishing:
Try to obtain financial or official information from internet users, usually sent as an email to look like it is from a legitimate company

Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. The OS she's working on is most likely _____.Linux

Windows Vista

Mac OS X

MS-DOS

Answers

Answer: MS-DOS

Explanation:

By definition, which security concept uses the ability to prove that a sender sent an encrypted message? A) Privacy B) Integrity C) Non-repudiation D) Authentication

Answers

The answer to the question is C) Non-repudiation
The answer is c Non repudiation

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A) a trojan B) phishing C) Use a surge protector. d) none of these

Answers

Answer:

A Trojan

Explanation:

Emma has downloaded a Trojan. A Trojan, also referred to as Trojan horse is a type of malware that may look like it is legitimate, but once installed in your computer, it can cause a great havoc by taking control of your computer. It is usually designed to cause damage to a system, or to steal information, or inflict harm to your network or computer.

Based on the scenario described, it is most likely that Emma has downloaded a malware onto her computer called as Trojan. Therefore, the correct option is A.

A Trojan is a type of malware that poses as a trustworthy program or file in order to trick people into downloading and installing it. Once installed, it can perform a number of nefarious tasks including stealing confidential data such as passwords and credit card details. Trojan horse is another name for Trojan. Trojans are so called because they hide their true nature like the famous Trojan Horse.

Therefore, the correct option is A.

Learn more about Trojan, here:

brainly.com/question/9171237

#SPJ6