1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
11

What is the different between 32bit anf 64 bit verision​

Computers and Technology
1 answer:
Elina [12.6K]3 years ago
8 0

<u>The different between 32 bit and 64 bit version:​</u>

  • The main difference between 32-bit and 64-bit versions is that a 32-bit version can access 2^3^2 memory addresses which is roughly equivalent to 4 GB of memory.
  • On the other hand, a 64-bit version can access 2^6^4 memory addresses which equates to a huge amount of memory, 16 exabytes to be precise.  
  • Nowadays, we observe that almost all the computers have 64-bit processors, which means that they can access any amount of memory over 4 GB till 16 exabytes.
  • 64-bit processors have various advantages like the increased speed of operations, smooth multitasking and they can also support video games and software's that have high graphical requirements.
You might be interested in
The new ICH E6(R2) integrated addendum requires sponsors to implement systems to manage quality throughout all stages of the tri
WINSTONCH [101]

Answer: Identification of study risks to determine which may safely be omitted from continual monitoring

Explanation:

 The ICH E6 basically uses the system that uses the risk based approach that include the identification of the risks of study that basically determine the continual monitoring safely.

The ICH met a specialist working gathering to make an addendum to the current E6 rule. The master  working gathering was comprised of ICH individuals from both industry and administrative offices, just as  observers to address and flow examine themes like quality by plan, quality hazard the board

7 0
4 years ago
Why shouldn't a server use a glass to scoop ice?
natali 33 [55]
A server shouldn't use a glass to scoop ice as the glass may break. This is due to the potential temperature difference between the glass (which may be room temperature or hotter if it is taken from a dishwasher), and the cold ice. Any existent hairline fractures in the glass may then expand and crack, whereby the smashed pieces of glass could then land in the client's food, table or lap, potentially causing injury to the person. 
7 0
4 years ago
Read 2 more answers
Our Client, a renowned trading company, suffered a sudden, devastating power outage that caused their server to cease functionin
Norma-Jean [14]

Answer:

Explanation:

I will consult the following strategies:

Step 1: Being a discerning consultant I should be knowing what exactly has caused the drive to get corrupted.

Step 2: After examining the current state of the hard drive I will explain the actual problem to the client in a very lucid and eloquent manner whether it is feasible to retrieve the lost data or it is beyond repair.

Step 3: Identify a solution to the problem with things at my disposal(finding a right tool).

Step 4: apply the solution found to retrieve the data from the hard drive.

Step 5: submitting the retrieved data from the corrupt drive to the customer and advocating them the preventive measures for future reference.

The above five steps will work perfectly to resolve the issue faced if followed with great care and being heedful of the situation at hand.

6 0
4 years ago
Please answer this please
dexar [7]

Answer:

It's not a question.

Explanation:

3 0
4 years ago
Which member of the Jackson family was the spokesperson for the Psychic Friends Network.​
Jlenok [28]

Answer:

La Toya Jackson

Explanation:

8 0
3 years ago
Other questions:
  • If the derived class does not override a public member function of the base class, you may specify a call to that public member
    7·1 answer
  • katniss dismisses effie's metaphor because, literally, she knows pearls cannot be created with pressurised coal,they come from w
    5·2 answers
  • A command, such as a button or keyboard shortcut, that performs a specific task is known as a
    9·2 answers
  • All of these (except the ______) go unnoticed by the computer
    7·1 answer
  • The backbone networks of the Internet are typically owned by long-distance telephone companies called
    12·1 answer
  • Which of the following is the fastest computer processing speed?
    10·1 answer
  • Computers and their input and output devices require power to work and may have many power cords. What is the safest way to orga
    7·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
  • Can you show me how to code this is GDBonline? explaining each statement with notes//
    7·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!