Which of the following types of data is NOT stored in RAM?

A) Web browsing session
B) Text that is copied to the clipboard
C) BIOS settings
D) Microsoft Word document you are working on


C

Computer Science & Information Technology

You might also like to view...

With NFS, you can mount shared file systems on remote machines.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ____ attempts to protect internal systems from outside threats.

A. security perimeter B. botnet C. risk management strategy D. buffer overflow

Computer Science & Information Technology

A(n) ____ loop is a condition-controlled loop that terminates when a value within a valid range is entered.

A. input-validation B. sentinel-controlled C. condition-controlled D. counter-controlled

Computer Science & Information Technology

To protect your wireless network, it is a good idea to change the router's default ________

Fill in the blank(s) with correct word

Computer Science & Information Technology