Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
<h3>How is virtual memory used instead of RAM?</h3>
A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.
With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.
Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
Learn more about virtual memory from
brainly.com/question/13088640
#SPJ1
The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.
<h3>Why is the audit function important?</h3>
The role of internal audit is known to be one that tends to give some measures of independent assurance that is need by a firm or an organization in terms of risk management, governance, as well as internal control processes to be able to operate effectively.
Note that an internal audit is said to be carried out objectively and set up to improve and make good an organization's business practices.
Hence, The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.
Learn more about audit function from
brainly.com/question/24170807
#SPJ1
NoSQL is primarily designed for supporting the decision making systems. Most NoSQL data stores were created to address problems associated with storing large amounts of distributed data in relational database management systems(RDBMS).
RDBMS is system used for the management of the database.D<span>ata is stored in the form of related tables.</span>
Answer:
The correct answer to the following question will be "Secure".
Explanation:
This file includes information about the rights of verification and authorization.
- It will be used primarily for monitoring the use of authorization schemes.
- It holds all communications related to safety like faults in encryption.
- This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.
So, it's the right answer.