Data stored __________ disappears once the program stops running or the computer is powered down.

a. on a CD
b. in RAM
c. on a flash drive
d. on the disk drive
e. None of these


b. in RAM

Computer Science & Information Technology

You might also like to view...

If a number is the highest possible exponent to which a number can belong, it is referred to as a _________ of n.

A) ?primitive root B) ?composite ? C) ?discrete logarithm D) ?bijection

Computer Science & Information Technology

You can share documents with others by e-mailing them or posting them to a blog from inside ________

A) Internet Explorer B) Share view C) Backstage view D) Outlook

Computer Science & Information Technology

____________________ is a technique that can be used to conceal data that might not be relevant to a particular report or sensitive data that others should not see.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Before installing a wireless network, you should prepare by performing what task?

A) Site survey B) Calibrate the antenna C) Response test by the wireless clients D) Authentication test on the access point

Computer Science & Information Technology