Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
<h3>How is virtual memory used instead of RAM?</h3>
A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.
With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.
Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
Learn more about virtual memory from
brainly.com/question/13088640
#SPJ1
Answer:
It reverts to the original image
Explanation:
Answer: James is all of the above
Explanation:
The potential risks that is linked with the use of internet as a resource point is known to be copyright infringement.
<h3>What is Copyright infringement?</h3>
This is known to be the creation of a book or any other resource material that has been copyrighted and protected without taking the granted permission of the copyright holder who is found to be the author of the work.
Note that The potential risks that is linked with the use of internet resource point is known to be copyright infringement and one can be punish for it.
Learn more about copyright infringement from
brainly.com/question/14855154
#SPJ4
Polymorphism is malware's ability to change the way it appears on different computers. This makes it very difficult for antivirus software to identify the malware.