Which of the following types of data is NOT stored in RAM?
A) Web browsing session
B) Text that is copied to the clipboard
C) BIOS settings
D) Microsoft Word document you are working on
C
Computer Science & Information Technology
You might also like to view...
With NFS, you can mount shared file systems on remote machines.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A ____ attempts to protect internal systems from outside threats.
A. security perimeter B. botnet C. risk management strategy D. buffer overflow
Computer Science & Information Technology
A(n) ____ loop is a condition-controlled loop that terminates when a value within a valid range is entered.
A. input-validation B. sentinel-controlled C. condition-controlled D. counter-controlled
Computer Science & Information Technology
To protect your wireless network, it is a good idea to change the router's default ________
Fill in the blank(s) with correct word
Computer Science & Information Technology