Most computers have temporary holding areas called __________.

A. output
B. microprocessor
C. CPU
D. RAM


Answer: D

Computer Science & Information Technology

You might also like to view...

What are the most important types of scanning?

What will be an ideal response?

Computer Science & Information Technology

What are the benefits of implementing systems and software using cloud computing?

What will be an ideal response?

Computer Science & Information Technology

In Access, you encrypt a database and set a password using two separate commands.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the accompanying figure, item E indicates which of the following?

A. The folios are all local B. The user is signed in C. A new folio will be created locally D. The user is not signed in

Computer Science & Information Technology