1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
13

what memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.

Computers and Technology
1 answer:
never [62]3 years ago
4 0
The computer will then utilize the internal hard disk space and use it as "Virtual Disk Memory". R/W Speeds will be significantly slower.
You might be interested in
3. Under which of the following categories does the artwork fall? ( 1 point )
Bumek [7]
Portrait is usually a painting of someone, still life is a very realistic drawing, monoprint is a print of an ex. leaf or other object.. its an ABSTRACT PAINTING
5 0
4 years ago
Read 2 more answers
There are several methods of updating information and data on a webserver. We must consider who performs those updates upfront w
Thepotemich [5.8K]

Answer:

RTMC pro, HTML server-sent and Java Software Development Kit

Explanation:

<u>RTMC pro</u>:  The setup of RTMC pro is done automatically and there is provision of several elements to upload and store data on the server using screens. Screens are usually saved as files and then integrated to an internal or external server.

<u>HTML server-sent</u> : This is a way for webpages to communicate with the webserver. In this method, for ever HTML page there is an associated script present on the server side that will continuously provide realtime data update. This scrip will have to be configured with the data you want to update.

<u>Java Software Development Kit</u> : JAVA SDK is used to build software/applications on Java. This permits programmers to develop applications or applets to perform data updating on the servers. The developped applets can be used with internal servers as well as third party servers.

5 0
3 years ago
Read 2 more answers
How to instal and complie java in windows?
Paladinen [302]
Go to www.oracle.com , the Downloads tab, find Java, probably SE (Standard Edition) and then select the appropriate SDK (Software Development Kit).

I don't remember if you need to use an absolute (full) path to javac on Windows, but the command is something like:

javac yourProgram

yourProgram needs to be named yourProgram.java
4 0
3 years ago
If you click the Increase Font Size button too many times and make the font size too big, you can click the ____ button until th
bagirrra123 [75]

Answer:

Decrease Font Size.

Explanation:

If the font size becomes too big by repeatedly clicking too many times Increase Font Size.So to decrease the font size you should click on the decrease font size until the size becomes desirable. Decrease font size as the name suggests is used to decrease the size of the font.So the answer is Decrease font size.

3 0
3 years ago
What kind of device converts signals from a campus's analog phone equipment into ip data that can travel over a phone company's
krek1111 [17]

I’d go with an ATA (Analog Telephone)

ATA converts analog voice signals to digital signals, which can be transmitted over the internet. This device lets you connect a standard telephone to a network so that it can use VOIP to make calls through the user’s internet connection. Without this device, there will be no connection between the analogue telephone and a digital network.    

6 0
3 years ago
Other questions:
  • A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
    11·1 answer
  • What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
    7·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • Which of the following is an example of indirect perception checking?
    7·2 answers
  • What can be designed to create annoying glitches or destroy data
    15·2 answers
  • What is the biggest difference between technical communication and the other kinds of writing you have done?
    13·1 answer
  • Which terms represent the two types of client requirements?
    14·1 answer
  • This diagram shows who is responsible in preventing cyberbullying. A flowchart. Top box is labeled Cyberbullying can be prevente
    14·2 answers
  • Every telecommunication setup uses two devices: one device to transmit data and one device to receive data. Which device transmi
    15·1 answer
  • Determine which system you would recommend each of the customers use based on their provided user and system specs.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!