1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
15

Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la

ptop supports 8GB of RAM and that the computer is running only 4GB of RAM. Jenny would like to add four more gigabits of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins.
Computers and Technology
2 answers:
Stolb23 [73]3 years ago
8 0

Answer:

You are allowed to take out the old ram to replaice it, so replaice it with 2 new 4 GB of ram you dont need to unless the laptop has already 4 GB of ram the type of ram you will use is DDR3 most newer pc's have DDR4 since laptopes are smaller you would need older ram

Explanation:

Oksanka [162]3 years ago
4 0

Answer:

SO-DIMM DDR3 is the correct answer.

Explanation:

In the following statement, Jenny is doing work on her laptop and she observes that the working of her laptop is slow because Jenny's laptop supports 8 GB of RAM but she currently working on 4 GB RAM. Then, she decided to extend their RAM and she opens her system and find that there is only one slot for the RAM then, she check another module and she noticed that the following module has 204 pins of SO-DIMM DDR3.

You might be interested in
What is the difference between business strategies and business models?
bogdanovich [222]

Answer:

A . Business strategies include long-term business plans, while business models include plans for daily business functions

7 0
3 years ago
Hilda is troubleshooting a problem with the encryption of data. at which layer of the osi reference model is she working?
Fittoniya [83]
The la<span>yer of the osi reference model that hilda is currently working on is: presentation
On Osi reference model, the presentation layer is created </span><span>to take care of the semantics and syntax of the information exchanged between two systems. The presentation layer will make sure that the receiver of the information will understand the data that being given.</span>
7 0
3 years ago
Explain the working system of computer systems with examples​
geniusboy [140]

,I don't know you all about computer

8 0
2 years ago
4) Wilkes continues to discuss the concept of time and how it relates to the type of photography he does. Why do you feel that t
lesya692 [45]

Wilkes photography style is solely focused on time lapse. His pictures from morning to night show the cycle of a day at a place in one image.

We cannot help you with the second problem , as we do not know what you learned in Unit 10.

3 0
3 years ago
Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from
vekshin1
The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. ... Database errors can be used with SQL Injection to gain information about your database.
6 0
3 years ago
Other questions:
  • Which activity cannot be done on a social networking site?
    12·1 answer
  • 6.67
    5·1 answer
  • In what country did true printing first take place?
    12·2 answers
  • A type of indent where the first line of text starts at the left margin and the second and succeeding lines of text are indented
    7·2 answers
  • How does it transform your ways of socializing
    11·1 answer
  • A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
    15·1 answer
  • What are some other features of sending attachments in Outlook 2016? Check all that apply.
    9·2 answers
  • What sort of negative outcomes are possible for this type of risk?
    14·2 answers
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
  • What is the main advantage of using DHCP?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!