1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
11

The amount of ram that is actually on the memory modules in your computer is the ________ memory.

Computers and Technology
1 answer:
viva [34]2 years ago
6 0
I think its physical memory but I am defiantly not confident about 90%
You might be interested in
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
What is nasa data speed
Goshia [24]
NASA downloaded data at a rate of 622 megabits per second<span> (Mbps) using a pulsed laser beam. For comparison's sake, Akamai technologies says that the average internet user has a connection speed of </span>3.3 Mbps<span>. In the United States, the average connection speed is </span>8.7 Mbps<span>.</span>
6 0
2 years ago
What is control flow in programming?
melisa1 [442]

Answer: Control flow, also known as flow of control in computer programming, refers to the sequence in which function calls, instructions, and statements are performed or assessed while a program is operating. Control flow statements are used in many programming languages to determine which part of code runs in a program at any given time.

4 0
2 years ago
Use the wrap text icon to
velikii [3]

click on the image and there should be an icon with an upside dwon "U" and lines, click that and select wrap text icon.... or any other text thing you see fit

3 0
3 years ago
6. Which of the following statements is true of the Internet?
ExtremeBDS [4]
It’s accessible to everyone across the globe
7 0
2 years ago
Other questions:
  • Which sparkline type is best for displaying trends in data changes over time?
    11·1 answer
  • How are network computers different from traditional personal computers? describe some usage scenarios in which it is advantageo
    12·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • When an entrepreneur has three employees at a busy and growing software company, what is the primary responsibility of the emplo
    6·1 answer
  • Why are coders using encoder software? What are their advantages and disadvantages? And when might a coder need to use the codin
    12·1 answer
  • Which of the following is a valid variable name? a. salesTax b. input-string c. 25Percent d. double
    8·1 answer
  • Write an application that determines whether the first two files are located in the same folder as the third one. The program sh
    6·1 answer
  • The binary number represented by the voltage graph below is
    6·1 answer
  • Help plz. due yesterday
    13·1 answer
  • Which option is the easiest way to configure macros in Access 2016?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!