Which of these is considered volatile storage?
a. SSD
b. ROM
c. RAM
d. thumb drive
C
You might also like to view...
Observe and interpret the output of the DHCP packets. You should see the followingpacket types: DHCP Discover, DHCP Offer, DHCP Request, DHCP Ack.
What will be an ideal response?
A ________ is a type of virus which attaches itself to a specific computer program and is activated when the program is run.
(a) logic bomb. (b) resident virus. (c) Trojan Horse. (d) transient virus.
Specific controls on a form can be protected by using the Controls command on the Developer tab
Indicate whether the statement is true or false
A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.
A. private key certificate B. private key signature C. public key signature D. public key certificate