1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
8

A customer asks you over the phone how much it will cost to upgrade memory on her desktop system to 16 GB. She is a capable Wind

ows user and able to access BIOS/UEFI setup using the user power-on password you set up for her. Which actions can you ask the customer to perform as you direct her over the phone to get the information you need and develop an estimate of the upgrade’s cost? a. Use BIOS/UEFI to view how much memory is installed and how much memory the system can hold. b. Enter info32.exe to determine how much memory is currently installed. c. Use BIOS/UEFI to show which memory slots are used and how much memory is installed in each slot. d. View the System Information window to determine how much memory is currently installed.
Computers and Technology
1 answer:
bulgar [2K]3 years ago
5 0

Answer:

b. Enter info32.exe to determine how much memory is currently installed.

Explanation:

The reason is that as an IT expert i'm not supposed to assume the users level of knowledge would be as good as mine so instead I would work the user through a more familiar and straight forward path such as booting to the windows first and then using the info32.exe command in the RUN interface.

You might be interested in
When you log into quickbooks online account whose books can you directly access and manage?
MArishka [77]

Answer: your books and the ones you are given access to.

Explanation: quickbooks goes from day to day bookkeeping to month and year end financial reports and tax filing. businesses use to manage daily sales and expenses and also keep track of daily transactions. They can involve or outsource bookkeepers or choose to run in-house operations. In doing this they would have access to all their books or decide to give virtual access to their outsourced bookkeeper/accountant. Quickbooks has multiple features concerning user access and privacy. A quick books user, in this case the business, can restrict access for each user it decides to add. The user can decide to give free access to all books or decide to restrict to a few files. Example, the business may add an accountant as one of its users and decide to restrict the accountant to its payroll files, depending on the agreement.

3 0
3 years ago
Describe how you would conduct a search for a single record.
Anastasy [175]
Er..... i do not know the answer to this
8 0
3 years ago
Say anything :) teeheeheheheheehhehe
nataly862011 [7]

Answer:

905 shooter slidin on the block he shot at opps no he got can stop running from the cops...

Explanation:

ON GANG PRRRA...

3 0
3 years ago
Read 2 more answers
A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increas
djyliett [7]

Answer:The capacity of the servers

Explanation:because is full

6 0
3 years ago
Fghfghgfhgfhgfhfghgfhgfhfghgfhgfh
Nataly [62]

Answer:

Stay safe, stay healthy and blessed.

Have a good day !

Thank you

3 0
3 years ago
Read 2 more answers
Other questions:
  • Why are rules required for a number system to be useful?
    10·2 answers
  • What website can help you find antivirus software
    5·2 answers
  • Which software would you use to create a print design?
    8·2 answers
  • My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
    13·2 answers
  • Which of the following is not an example of plagiarism?
    10·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • Discussion Topic:
    9·1 answer
  • _____ refers to the programs that a device can run.
    9·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
  • which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!