1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
4 years ago
9

A company operates on two types of servers: 2 large servers (L) and 4 smaller servers (S), with a combined total of 64GB RAM. Th

e other day a large server and a small server blew out reducing the total RAM to 40GB. How much RAM does each large server (L), and each small server (S) have
Computers and Technology
1 answer:
kati45 [8]4 years ago
8 0

Explanation:

Let the size of a large server be L, and

the size of a small server be S.

We are given two scenarios,

2L+4S = 64.............(1)

and

L+3S = 40...............(2)

We solve the equations as follows

2(2)-(1)

2L-2L +6S-4S = 2*40-64

2S = 16

so S=8 ..................(3), size of small server

substitute (3) in (2)

L+3(8) =40

L = 40-24 = 16..............size of large server

You might be interested in
When streaming video, data is temporarily stored in a
dangina [55]

Answer:

hey,ik this isnt the answer,but we talked yesterday. my acct got deleted,so i had to make a new one.

Explanation:

6 0
3 years ago
Read 2 more answers
what security threats do you face in your everyday computer usage? list the current security you use on your digital devices wha
gulaghasi [49]

Answer:

1. The basic threat is junk mails which contains malicious links. There can also be malicious applications on the web which when downloaded can also cause the download of malware. Zero day threats are also being used by hackers to target an OS for a single day.

2. Anti virus software such as MACFREE

3.Threats such as Computer virus, computer worms, Trojan horse, Phishing, Spyware, Rootkit etc. will targets network.

4. I will increase security by:

a) Installing a firewall

b) Updating all the applications and OS

c) Verifying applications before downloading

d) Boost access control by providing strong passwords

Explanation:

5 0
3 years ago
How do careers of firefighters and police officer death fire in what ways are they similar​
Reil [10]

Answer:they both save lifes

Explanation:

and mistakes are costly and life risking

4 0
3 years ago
How many data bits are sent in a single psk31 character?
ololo11 [35]
I would say the number varies.
8 0
3 years ago
What is wrong with the formula below?<br><br> SUM(A1:A5)/SUM(B1:B5)
Vlad [161]

Answer:

You forgot the "=" sign.

Explanation:

formulas in excel start with an "="

=SUM(A1:A5)/SUM(B1:B5)

4 0
4 years ago
Other questions:
  • Cable television systems originated with the invention of a particular component. What was this component called?​
    9·1 answer
  • HELP QUICK!!!
    14·2 answers
  • Which statement accurately describes the process for storing AutoRecovered files?
    7·2 answers
  • In this lab, you will write a function called numberGuessingGame(). When the function is called, it will do the following: gener
    13·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • How do I make sure I have full access to this app where do I put in payment information
    8·1 answer
  • Assume you are a security professional. You are determining which of the following backup strategies will provide the best prote
    10·1 answer
  • Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
    10·1 answer
  • What errors does the grammar tool find? Choose all that apply
    11·1 answer
  • What are some of the key system-oriented trends that have fostered is-supported decision making to a new level?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!