In procedural languages ____ memory stores and fetches values to and from memory cells.

external
random access
read only
flash


random access

Computer Science & Information Technology

You might also like to view...

The privacy specialist documents and maintains records of all ____ practices used to protect personal data.

A. data-based B. risk-based C. control-based D. threat-based

Computer Science & Information Technology

Security and recovery are two important functions of a Database Management System, which are also of interest to Database Administration. Various facilities can be provided to aid both these functions. Explain what these facilities are and with examples, show how Database Administration could effectively use them.

What will be an ideal response?

Computer Science & Information Technology

The ________ path to a file is the path beginning at the root.

a) relative b) absolute c) working d) symbolic

Computer Science & Information Technology

The term RAM refers to random alternate memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology