1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
7

A motherboard uses dual channeling, but you have four DIMMs available that differ in size. The motherboard supports all four siz

es. Can you install these DIMMs on the board? Will dual channeling be enabled?
Computers and Technology
1 answer:
Andru [333]3 years ago
7 0

Answer:

Explanation:

We can install four DIMMs with different size, for example if we want 1 GB, 2 GB, 4 GB, and 8 GB, in this example every DIMM are different, but we can install these DIMMs in our motherboard, but the dual channeling, in this case is not enabled, because DIMMs must be with the same size, frequency, latency, and even model, and nowadys there is quad channeling.

You might be interested in
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
2 years ago
Computers have drastically changed society over the last 20 years. How have computers affected communication in the business wor
iren2701 [21]

<u>Drastic change of over society Computers:</u>

In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.

Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.

1. Crime (computer)

2. failure of responsibility in the computer.

3. Protection of software records and documents etc.

4. End user  data protection and privacy.

99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.

5 0
2 years ago
Why are 90% of questions not being answered im scrolling through the questions. Most are not being answered except the easy ques
Anna [14]
I actually have this problem all the time. Rarely any of my questions get answered and I see this happening to other people all the time. It's crazy. 
5 0
3 years ago
Read 2 more answers
What do you need to know when buying screws<br>​
ozzi
The length and the width
6 0
2 years ago
Read 2 more answers
A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
Alex Ar [27]

Answer:

Antelope Baboon Cheetah Elephant Giraffe, first, then it would search Warthon then Okapi, the manner of a binary search essentially splits the list in half and goes from right to left and then does the same to the other side.

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Which access control principle limits a user's access to the specific information required to perform the currently assigned tas
    12·1 answer
  • A matrix representation stores matrices such that the offset address of the element in row i and column j can be calculated by c
    12·1 answer
  • In terms of data storage and sharing, in what way, if any, do dropbox services differ from archiving services?
    8·1 answer
  • Who invented the ENIAC? More than one answer may apply.
    14·1 answer
  • Explain the components of Information System?​
    13·1 answer
  • Reading log of any book with page numbers​
    5·1 answer
  • What is an example of a reputable website
    15·2 answers
  • What is the difference of expository and reflexive documentary
    14·1 answer
  • A _____ network is where all computers are equal and each one is both data requester and data provider.
    13·1 answer
  • What do you call the quality of information
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!