1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
1 year ago
11

Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5 GiB of RAM, program

3 is using 12 GiB of RAM and program 4 is using 4 GiB of RAM. The programs are at the stage where program 5 now needs to access RAM, but RAM is presently full (RAM has a 32 GiB maximum capacity). Explain how virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost.
Computers and Technology
1 answer:
muminat1 year ago
6 0

Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

<h3>How is virtual memory used instead of RAM?</h3>

A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.

With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.

Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

Learn more about virtual memory from

brainly.com/question/13088640

#SPJ1

You might be interested in
Tasked to install additional RAM in a computer. He unplugs the system from the power source and removes the PC cover. What shoul
Galina-37 [17]

Answer:Put on an ESD(Electrostatic discharge) strap.

Explanation: An ESD wrap which is also known as ground wrap is a sort of a wrap that is tied around the wrist to protect the person electronic equipment's static electricity.  This wrap produces anti static energy which help in not producing any static charge while the technician touches the inner parts of the CPU of other internal parts of the system.

4 0
4 years ago
Every type of internet service requires a connection and monthly payment to a(n): isp voip lms mmorpg
Rainbow [258]
Every type of Internet service requires a connection and monthly payment to an internet server provider. An Internet service provider or as called as ISP is a company that offers customers with internet access. The data may be conveyed using several technologies as well as dial-up, DSL, cable modem, wireless or enthusiastic high-speed interrelates.
6 0
4 years ago
Alex writes down a string with four digits. (Since this is a string, not a number, it can start with a $0.$ For example, Alex co
Artist 52 [7]

Answer: The answers to all parts of this question are based on "automatic string". The condition is also provided which states that the string the machine outputs is the same string (4-digit string) which is fed to the machine as input.

Explanation: (a) The string will not remain automatic string if it contains a digit greater or equal to $5$. As we know that machine should print the same string which is fed into it. In this case the machine will insert a 0 in place of $5$. So the number is inserting a 0 when it is output by the counting machine. For example if we input $2152$ machine will print "$0120$" which shows that the digits are not the same as fed to the machine. If we take string $0702,$ which is given in the question, we see that machine prints out "$2010$" which means that number is inserting a 0 so automatic string cannot contain a digit greater than $5$

(b) The same answer as given in (a). For example the if we write $4220$ machine prints out "$1020$".  So the automatic string cannot contain $4.$

(c) This is a bit tricky as machine count the digit $3$. Lets take an example string $3303$. the machine prints out "$1003$". It counts three BUT its not an automatic string because the string printed out is different from the string that was fed to the machine. So automatic string cannot contain $3.$

(d) Now we know that an automatic string cannot contain digits 3,4,5 and above. So it can contain digits 0,1 and 2 with 0 at the end as the automatic string cannot contain digit 3 or above.Lets take a few examples of strings with combinations of 0,1 and 2 to check if they are automatic strings.

  • $1220$ the machine prints $1120$ which is not the same as fed into machine so its not an automatic string.
  • $2020$ the machine prints out "$2020$". Its 2 times "$0$", 0 times "$1$",2 times "$2$" and 0 times "$3$" which is the same as fed to machine so $2020$ is an automatic string.
  • $1210$  is an automatic string as the machine prints out "$1210$" which is the same string fed to machine.
8 0
3 years ago
What are the difference between requests management to problem management??​
BaLLatris [955]

Answer:

Problem management is a practice focused on preventing incidents or reducing their impact.

Request Management is the systematic handling of the tasks required for a variety of different internal or external requests using workflow automation, business rules, and analytics. Request management problems manifest in a variety of ways in any organization: Slow request turnaround times.

Explanation:

4 0
3 years ago
Write a program that displays Welcome to Java five times. INPUT and PROMPTS. None. OUTPUT. The output should be five lines of th
Leya [2.2K]

Public class WelcomeTimes5{

public static void main(String[]args){

string welcome = "Welcome to java five times" ;

system.out.println(welcome);

system.out.println(welcome);

system.out.println(welcome);

system.out.println(welcome);

system.out.println(welcome);

}

}

8 0
3 years ago
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    7·1 answer
  • Which data type stores images and audio visual clips?
    9·2 answers
  • The network services and facilities that users interact with are provided by
    11·1 answer
  • Web pages are accessed through a software program called a _____.A) ​web crawlerB) ​web browserC) ​web serverD) ​web app drawer
    5·1 answer
  • Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
    9·1 answer
  • Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.
    14·1 answer
  • In python
    9·1 answer
  • Which key doesn't relate to keyboard
    6·2 answers
  • ## Inputs
    15·1 answer
  • Select the correct answer from each drop-down menu,
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!