1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
9

In which slot is a video card most commonly installed within a laptop?

Computers and Technology
1 answer:
lesya692 [45]3 years ago
8 0

Answer:

PCIe

Explanation:

If we're talking about video slot the PCI is the most commonly installed in a laptop, but in this case, we have the PCIE or PCI-Express, this was the most common video slot in 2007 and is confused for the PCI-X.

We can increase the bandwidth with this video slot, this slot PCI-X could be 32 times faster than PCI 2.1, with PCIE 1.1 we can transport 250mb/s in each direction.

You might be interested in
Name the different type of vegetation found in India ?​
maw [93]
Tropical Rainforests, Tropical Deciduous Forests, Tropical Thorn Forests and Scrubs, Montane Forests and Mangrove Forests.
4 0
3 years ago
Read 2 more answers
What is the purpose of the Subtotal feature?
Svetradugi [14.3K]

Answer:

performs calculations

Explanation:

The SUBTOTAL function in Excel allows users to create groups and then perform various other Excel functions such as SUM, COUNT, AVERAGE, PRODUCT, MAX, etc. Thus, the SUBTOTAL function in Excel helps in analyzing the data provided.

5 0
2 years ago
Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
dlinn [17]

Answer:

A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area.

the use of buried sensor for perimeter intrusion detection system, becomes very popular due to the advantage of been a discreet or even an invisible detection system and avoiding the need to build an above-the-ground fence to protect the perimeter due to costs or environmental reasons

Explanation:

<em>Description of 3 systems:</em>

Barrier-Mounted :Fence Intrusion Detection System

PIDS deployed on or in conjunction with a fence or other physical barrier (e.g. DAS cable or other motion sensors mounted on a fence).

Ground-based or Below-ground :

PIDS deployed below ground (again a DAS cable can be used or pressure sensitive cable or electromagnetic field). These do not require a physical barrier.

Free-Standing

PIDS deployed above ground that do not need to be installed on or in conjunction with a physical barrier (e.g. bistatic microwave link).

Example of one PIDS system I have seen deployed in a familiar location is the ones at the prison which is a barrier mounted or some inairports that prevent small to cause harm to small animals.

4 0
3 years ago
Which audio media can be directly sent to the subscribers through an RSS feed?
larisa86 [58]
I believe it’s c sorry if I’m incorrect though
5 0
3 years ago
Which of the following is true of functions?
Anna11 [10]

Answer:

the answer is D

Explanation:

4 0
3 years ago
Other questions:
  • Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and
    7·1 answer
  • What is the communications activity of the Internet called
    15·1 answer
  • A _____ is the useful part of a transmission through a network.
    15·1 answer
  • Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
    14·1 answer
  • What is another term for accountability?
    7·2 answers
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    8·2 answers
  • Your windows system is used by several people, so you want increase security by requiring users to create passwords that are at
    9·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!