Which of these is considered volatile storage?

a. SSD
b. ROM
c. RAM
d. thumb drive


C

Computer Science & Information Technology

You might also like to view...

Observe and interpret the output of the DHCP packets. You should see the followingpacket types: DHCP Discover, DHCP Offer, DHCP Request, DHCP Ack.

What will be an ideal response?

Computer Science & Information Technology

A ________ is a type of virus which attaches itself to a specific computer program and is activated when the program is run.

(a) logic bomb. (b) resident virus. (c) Trojan Horse. (d) transient virus.

Computer Science & Information Technology

Specific controls on a form can be protected by using the Controls command on the Developer tab

Indicate whether the statement is true or false

Computer Science & Information Technology

A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.

A. private key certificate B. private key signature C. public key signature D. public key certificate

Computer Science & Information Technology