1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
6

A motherboard has four DIMM slots; three slots are gray and the fourth is black. What type of memory is this board designed to u

se?
Computers and Technology
1 answer:
rodikova [14]3 years ago
6 0

Answer:

A motherboard will require DDR3 type of memory.

Explanation:

In the motherboard, we use DDR3 RAM. It stands for "Double Data Rate 3" full name of this ram is DDR3 SDRAM where SDRAM stands for "Synchronous Dynamic Random-Access Memory". It was firstly implemented in the 1970s.

  • DRAM is not clock-controlled.
  • The DRAM is asynchronous RAM i.e. with no Synchronous replication of external stimulus.
You might be interested in
A public Wi-Fi risk that can be minimized by only visiting
lord [1]

Answer

it is B

Explanation:

because i had the test and i picked that

6 0
3 years ago
Which algorithm makes the most efficient use ofmemory?
SashulF [63]

Answer:

Best-fit Algorithm

Explanation:

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.

<u>Example</u>

Let these are the memory locations-210kb,310kb,260kb,610kb

                    and size of processes-160kb,450kb,250kb,300kb

For the first-fit,

We allocate 160 kb to the 210kb memory location

Then, we allocate 450 kb to the 610kb because others don't have the size.

Then,we allocate 250kb to the 310 kb.

300 kb will stop,as no memory locations can execute.

For the Best-fit,

We allocate 160 kb to the 210kb memory location

Then,we allocate 450kb to the 610kb.

Then,we allocate 250kb to the  260kb not 310kb according to best-fit.

Then we allocate 300kb to the 310kb.

For the worst fit,

We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.

Then,we can't allocate 450kb to any memory location.

Then,we allocate 250kb to the 310kb .

We can' allocate 300kb in 260kb memory location.

As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.

In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.

In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.    

5 0
3 years ago
I really want to know the best way to deal as much heart as possible plz tell me
Natasha2012 [34]

Answer:

Set aside time every day for doing something that feels positive, whether that’s journaling, meeting up with a close friend, or watching a show that makes you laugh. Scheduling in moments that bring you joy is vital for healing a broken heart. It’s important to talk about your feelings with others and not numb yourself out.

Explanation:

7 0
3 years ago
Read 2 more answers
List five kinds of view in the computer and briefly define each​
mr Goodwill [35]

Answer:

It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program).

5 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Other questions:
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • What is the answer please
    13·2 answers
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • the equation t= 0.25d^1/2 can be used to find the number of seconds, t, that it takes an object to fall a distance of d feet how
    8·1 answer
  • What does the following statement do? vector v(10, 2);
    6·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • Given a String variable response that has already been declared, write some code that repeatedly reads a value from standard inp
    10·1 answer
  • To create a pull quote, how should a user format the text?
    6·2 answers
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
  • Computer Hardware can consist of a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!