1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
4 years ago
6

Data for which there is temporarily no Room in ram is diverted to where on your computer?

Computers and Technology
1 answer:
vlada-n [284]4 years ago
8 0
If there isn't any room in the RAM (Random Access Memory), the program that will have the least affect on the PC will close.
Hope this helped
You might be interested in
Which of the following is one of the tools used by a Python IDE that helps prevent syntax errors?
Gala2k [10]

Answer:A. It adds color to keywords.

Explanation:

A. It adds color to keywords.

3 0
3 years ago
Write a definition in your own words for GUI. Do not copy and paste please.
Goryan [66]

Answer:

something where you can interact with and it takes you somewhere. for example, you click g00gle and it takes you to g000gle.

Explanation:

8 0
3 years ago
Read 2 more answers
?__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting
amid [387]
Remote terminal units (RTUs) is the <span>term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline. RTUs are the essential part of an intelligent power grid, also called smart grid, but also intelligent production system.</span>
8 0
3 years ago
87. Labor Department surveys show a close relationship between job<br> security and
faust18 [17]

Answer: office

Explanation:

When there is job, there is security with security,you need an office

8 0
4 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
Other questions:
  • ____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw
    12·1 answer
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • Help?!<br> Does anyone know how to use Adobe SoundBooth?
    14·2 answers
  • What is the name of the amount of space between the content of a document and the edge of the page?
    13·1 answer
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • Please help.........​
    13·1 answer
  • Explain external interface bus
    7·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!