Answer:
.JPEG
.PDF
.pptx
General Concepts:
<u>Google</u>
- Slides has an option to download a wide multitude of formats
Explanation:
If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.
Attached below is an image of the options.
Answer:
event based and time based
Explanation:
OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated
<span>Truth tables are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.
A truth table shows all the possible combinations (outputs) that can be produced from the given inputs. They are mainly used in Boolean algebra.</span>
Answer:
Hard drive
Explanation:
The hard drive is where the operating system, programs and data reside on (unless the data is saved and backed up elsewhere). An older hard drive that uses platters for reading and writing data to it will be slower than a later model solid state device. Newer hard drives have very fast access speeds compared to older units.
Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
<h3>How is virtual memory used instead of RAM?</h3>
A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.
With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.
Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
Learn more about virtual memory from
brainly.com/question/13088640
#SPJ1