1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
5

You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?

Computers and Technology
1 answer:
bearhunter [10]3 years ago
8 0
Hey there!

Memory (RAM) is considered to be hardware since it is a physical component that makes up the computer and is accessed through the CPU rather than internal code that makes the computer run (which is software). Therefore, if you are having issues with the memory, it is likely a problem with a memory chip, making it a hardware issue. 

Hope this helped you out! :-)
You might be interested in
With the help of what memory a computer can read as well as write or modify data
vivado [14]

Answer

Hi,

With the help of <u>random access memory(RAM)</u> a computer can read as well as write or modify data.

Explanation

Memory is a vital element in computers because it allows it to perform simple tasks. The random access memory/read write memory/main memory/primary memory is a volatile memory data stores the programs and data that the CPU requires for execution. This type of memory can easily be written as well as read from using the software associated with its functioning.

Hope this Helps!

6 0
2 years ago
Dentify the benefits of workplace diversity. Select all that apply.
soldier1979 [14.2K]

Answer:

Explanation:

slay ty

7 0
1 year ago
Discuss the purpose of Javadoc.
masha68 [24]

Answer: Javadoc is type of tool that is used for reading the comments that are formatted in Java source code. It helps in the production of the Java code documentation from these java codes in the HTML(hyper test markup language).

The purpose it serves is changing the API documents into the HTML code documentation or HTML web pages.This service is used while programming takes place.

8 0
3 years ago
Which of the following activities poses the greatest personal cybersecurity risk?
schepotkina [342]

Answer:

a

Explanation:

edge

7 0
3 years ago
Read 2 more answers
If a user watches a video with event tracking three times in a single session, analytics will count how many unique events?
Aleksandr [31]
The corect answer is:
1

Explanation and more info: http://www.certificationanswers.com/en/if-a-user-watches-a-video-with-event-tracking-three-times-in-...
8 0
3 years ago
Other questions:
  • Which Azure service should you use to correlate events from multiple resources into a centralized repository?
    5·1 answer
  • Do people answer questions more on this site or be on social more ??? no right or wrong answer your opinion
    12·1 answer
  • HIPAA protects which of the following kinds of data?
    11·2 answers
  • This library function returns a random floating point number within a specified range of values. The function returns a random f
    12·1 answer
  • Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect
    11·1 answer
  • Which of the following strategies might be useful when organizing items in your study area?
    7·1 answer
  • What is the system that consists of nonproprietary hardware and software based on publicly known standards that allow third part
    13·1 answer
  • so you just gonna bring me a birthday gift on my birthday to my birthday party on my birthday with a birthday gift
    9·2 answers
  • The __Option carries out the commands one at a time. O Step-by-Step Run Command Open Command​
    9·1 answer
  • Hypertext enables you to navigate through pieces of information by clicking the __________, that connect them.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!