1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
11

What is the different between 32bit anf 64 bit verision​

Computers and Technology
1 answer:
Elina [12.6K]3 years ago
8 0

<u>The different between 32 bit and 64 bit version:​</u>

  • The main difference between 32-bit and 64-bit versions is that a 32-bit version can access 2^3^2 memory addresses which is roughly equivalent to 4 GB of memory.
  • On the other hand, a 64-bit version can access 2^6^4 memory addresses which equates to a huge amount of memory, 16 exabytes to be precise.  
  • Nowadays, we observe that almost all the computers have 64-bit processors, which means that they can access any amount of memory over 4 GB till 16 exabytes.
  • 64-bit processors have various advantages like the increased speed of operations, smooth multitasking and they can also support video games and software's that have high graphical requirements.
You might be interested in
In this website/app what are the points for?
Lyrx [107]
The points are a leveling up system. You also use the points when you ask questions as well. Hope this helps! :-)
5 0
3 years ago
2. Who created the first photograph? How was this done?
fenix001 [56]
<span>Nicephore Niepce produced the first permanently fixed photograph made with a camera in 1826. </span>
4 0
3 years ago
Read 2 more answers
A computer operating system software manufacturer invests its profits in creating newer versions of its operating system softwar
PIT_PIT [208]

Answer:

False

Explanation:

Diversification involves increasing the reach of a particular software to meet the needs of different people. When a particular software is developed to provide multiple services for different individuals, it can be categorized as diversification but when the software is improved upon to meet the same users within a specific domain, the software can not be said to be diverse.

From our scenario, the operating system software is improved upon to handle the continuous changes in computer, this does not make the operating system software diverse, it just becomes better.

8 0
3 years ago
We will pass you 2 inputsan list of numbersa number, N, to look forYour job is to loop through the list and find the number spec
Montano1993 [528]

Answer:

The Python code is given below

Explanation:

# Get our input from the command line

import sys

N = int(sys.argv[2])

# Convert the list of strings into integers

numbers= []

for i in sys.argv[1].split(","):

   if(i.isdigit()):

       numbers.append(int(i))

# numbers now contains the list of integers

f = False

#Use for loop upto len(numbers)

for i in range(0,len(numbers)):

   #Use "if" loop to check

   if numbers[i] == N:

       #Assign "True" to "f"

       f = True

       #Display "i"

       print(i)

       break

#Check "if" loop by assigning "false" to "f"

if f==False:

   #Print "-1"

   print("-1")

4 0
3 years ago
Scenario: The deputy incident commander will be replacing the current incident commander, who needs to attend to a family emerge
Flauer [41]

The current incident commander should: provide a transfer of command briefing to the new commander.

<h3>What is incident management?</h3>

Incident management can be defined as a strategic process through which a business organization (company) identifies, analyzes, and correct hazards and potential threats (problems), so as to ensure that normal service operation is restored as quickly as possible to its end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.

<h3>What is a command?</h3>

A command can be defined as a set of instruction which sets and provide the incident strategies, priorities, objectives, as well as possessing the overall responsibility for any incident.

In this scenario, we can infer and logically deduce that the current incident commander should provide a transfer of command briefing to the new commander because rank, grade, and seniority aren’t factors that are used to select an incident commander.

Read more on incident management here: brainly.com/question/11595883

#SPJ4

5 0
2 years ago
Other questions:
  • What two images did you have to add to the wds server to handle the windows installation?
    7·1 answer
  • You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1
    12·1 answer
  • What lie does E.D. tell to keep the musical from being canceled? There is a television crew coming to do a story on it. Jake wil
    6·1 answer
  • an object or device outside the computer, that one would plug into a port to control the functions of a computer are?
    9·2 answers
  • Drag each storage device to its category.
    7·1 answer
  • What problem with internal hardware components is similar to unplugged
    6·2 answers
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • Is a router on the local network that is used to deliver packets to a remote network?
    15·1 answer
  • Write a Java program that creates a two-dimensional array of type integer of size x by y (x and y must be entered by the user).
    7·1 answer
  • When should you stop where you are, drop to the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!