1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
15

Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la

ptop supports 8GB of RAM and that the computer is running only 4GB of RAM. Jenny would like to add four more gigabits of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins.
Computers and Technology
2 answers:
Stolb23 [73]3 years ago
8 0

Answer:

You are allowed to take out the old ram to replaice it, so replaice it with 2 new 4 GB of ram you dont need to unless the laptop has already 4 GB of ram the type of ram you will use is DDR3 most newer pc's have DDR4 since laptopes are smaller you would need older ram

Explanation:

Oksanka [162]3 years ago
4 0

Answer:

SO-DIMM DDR3 is the correct answer.

Explanation:

In the following statement, Jenny is doing work on her laptop and she observes that the working of her laptop is slow because Jenny's laptop supports 8 GB of RAM but she currently working on 4 GB RAM. Then, she decided to extend their RAM and she opens her system and find that there is only one slot for the RAM then, she check another module and she noticed that the following module has 204 pins of SO-DIMM DDR3.

You might be interested in
Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
Veseljchak [2.6K]

Solution :

<u>Chrome web browser</u>

The Chrome web browser uses a range of privacy and security settings for its customers. They include several security indicators as well as malware protection. Chrome uses the sandboxing technology, which prevents the harmful viruses and Trojans from reaching the computers.

Chrome provides a safe browsing by giving us an alert whenever we try to browse some harmful web sites.  It also warns you if we use a username and password combination which has been compromised in any data leak.

Chrome also serves to protect the individuals :

It provides a features of Ad blocking.

When we want to browse safely without being recognized or without storing any credentials, Chrome provides an Incognito mode.

Many businesses can be done on the internet using Chrome platform that is safe and authenticate to gather and collect data and information.

3 0
2 years ago
What to do when microsoft word is eating your words?
Aloiza [94]
Update it so it wont do that
4 0
3 years ago
Which item converts a high level language program to low level machine instruction?
vodomira [7]
The compiler translates each source code instruction into the appropriate machine language instruction, an
8 0
3 years ago
Consider the following statements. An abstract class is better than an interface when the variables in the abstract class or int
Ksivusya [100]
Well the nonchalant question given for 4th grade red named babyface Justin and Jerome
4 0
2 years ago
Which is one is bigger 326 kb or 60,436 kb?
Nitella [24]

60,436 is larger.

A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits).

7 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct statement(s) regarding digital baseband modulation.
    7·1 answer
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • What process combines data from a list with the content of a document to provide personalized documents?
    9·2 answers
  • What is one way to measure technological progress?
    5·1 answer
  • List at least three benefits of automated testing?
    13·1 answer
  • You are applying for a secretary position. You have many skills but which of the following would not be one to include on the ap
    12·2 answers
  • I have wings, I am able to fly, I‘m not a bird yet I soar high in the sky. What am I?
    14·2 answers
  • With _____, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data
    10·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!