1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
3 years ago
8

A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection

against errors. What type of memory would be best suited for this?ECCRDRAMDDR3DDR2
Computers and Technology
1 answer:
Alexxandr [17]3 years ago
6 0

Answer: ECC (Error-correcting code) memory

Explanation: Error correcting code memory is the memory that has the capability of detection and correcting the error arising in the data.The internal data is the most effected data from the corruption and damage.It is the memory used in the computer and other operating system because it has less tolerance towards data corruption.

The technician should use the ECC memory for the building of the client station.This will protect the system and the data from getting in any circumstance.

You might be interested in
Hi im new and would like you to answer​
soldier1979 [14.2K]

Answer:

Explanation:yes

7 0
4 years ago
1)What is the hydropower resources/energy?
s344n2d4d5 [400]

Answer:

.

Explanation:

.

6 0
3 years ago
Following program use in coding
storchak [24]

Hmmmmmm..... I think its java if I'm correct

7 0
3 years ago
Consider the acknowledgment for a packet with sequence number n. A __________ acknowledgment indicates that all packets up to an
antoniya [11.8K]

Answer:

cumulative

Explanation:

Acknowledgment acknowledges that receiver has correctly received a packets which implicitly informs the sender that the previous packets were already received correctly.

4 0
3 years ago
What is the result of adding 1234.5674 and
Charra [1.4K]

Answer:

C. 1280.245

Explanation:

1234.567 + 45.678 = 1280.245

3 0
3 years ago
Other questions:
  • Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
    11·1 answer
  • Poems Roses are red,
    15·1 answer
  • Refer to the exhibit. what is the administrative distance value of the route for router r1 to reach the destination ipv6 address
    9·1 answer
  • What are the main types of software? Explain with appropriate examplesWhat are the main types of software? Explain with appropri
    12·2 answers
  • When you use filter by form to restrict records that appear, you create the filter and then click the ____ button to apply the f
    8·1 answer
  • Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
    14·1 answer
  • Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc
    15·1 answer
  • A _____ is a tool that helps you research information on the Internet.
    6·1 answer
  • c++ Project 6: Buoyancy. Buoyancy is the ability of an object to float. Archimedes’ principle states that the buoyant force is e
    13·1 answer
  • Please help! first one to answer correctly gets brainliest and thanked
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!