1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
9

__________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a

ny other work that has occurred during past Windows sessions.
Computers and Technology
1 answer:
sergey [27]3 years ago
4 0

<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.

Explanation:

I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.

This Process at times results in  slowing down of the computer  computer considerably.

<u>The combination of RAM and swap files is known as virtual memory.</u>

It is due to the  use of virtual memory that our computer is able to  run more programs than it could run in RAM alone.

You might be interested in
What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
polet [3.4K]

Answer:

Type of Business/entity and User Location are True.

User Intent and your judgment are False.

Explanation:

The following are the factors that treated at the time of deciding the following business is based on the too far query and the location of the user. So, That's why the first two factors are applied by the type of business or entity and the location of the user but the last two factors are not applied because it is not about the user, it is related to the firm or the business.

7 0
3 years ago
A server can be added to Server Manager by which of the following methods?
solmaris [256]
C. Importing a text file.  Server manager is where you can remotely administer your servers. Answer a. isn't true because you don't need a web server running to be remotely managed. b. Isn't true because wscript is old technology and microsoft would most likely use powershell, and DHCP is used to hand out IP addresses.
3 0
3 years ago
When a user inserts a PivotTable, where will it be inserted?
Alexeev081 [22]

Answer:

depends on whether the Pivot Table is inserted into the current worksheet or a new worksheet and the current location of the cursor.

Explanation:

Pivot tables are short tables with few columns and rows out of the original set of rows and columns. And they are being governed by the report filter, and column labels can also be added, as well as rules can be applied to value, but for formulas, we need to create the formula field. However, it can be placed in the current worksheet or a new worksheet and the current location of the cursor.

3 0
3 years ago
Which of the following is a proper use of the application NetStumbler?Which of the following is a proper use of the application
Eddi Din [679]

Answer:

Finding rogue access points within your network

Explanation:

A

5 0
4 years ago
Read 2 more answers
What are several different types of software, which sit in the middle of and provide connectivity between two or more software a
brilliants [131]

Answer:

The answer to the given question is the option "a".

Explanation:

In this question, the answer is "middleware" software because this software works between the operating system and the applications that provide connectivity to two or more software applications. for example database, application server, etc and other choices that are not correct can be described as:

  • In option b, The integration middle wear represents the software of the system. It does not coordinate between operating and application software.
  • In option c, It is used to manage the data and the information for the process.
  • In option d, It includes the hardware, software and the networks. In this hardware and software link for use software.

That's why the answer to this question is the option "a".

6 0
3 years ago
Other questions:
  • Hardware- The ______________ equipment that makes up the computer.
    6·1 answer
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • Write a program that reads an arbitrary number of integer that are in the range 0 - 50 inclusive and counts how many occurrences
    15·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • Question # 4
    5·1 answer
  • Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
    8·1 answer
  • Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character
    15·1 answer
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
  • Write the necessary preprocessor directive to enable the use of the stream manipulators like setw and setprecision Additional No
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!