1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
9

__________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a

ny other work that has occurred during past Windows sessions.
Computers and Technology
1 answer:
sergey [27]3 years ago
4 0

<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.

Explanation:

I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.

This Process at times results in  slowing down of the computer  computer considerably.

<u>The combination of RAM and swap files is known as virtual memory.</u>

It is due to the  use of virtual memory that our computer is able to  run more programs than it could run in RAM alone.

You might be interested in
Which of the following is not a legal identifier?
Paraphin [41]

Answer:

321Go

Explanation:

The identifiers in C, C++, C#, Java and other programming languages are a combination of letters, numbers and the underscore symbol.  The laters versions of C and C++ allows you to use almost all Unicode characters. In Java, you can use also the dollar sign.

From that you have to be careful to follow these rules:

-Don't use keywords.

-Don't include white spaces.

-Don't use operators.

-Don't repeat identifiers.

-Don't start your identifier with a number.

-Don't use two consecutive underscores.

So app_234, happyTimesAhead, and cis22B are follo wing these rules but 321Go starts with a number.

4 0
3 years ago
Active Directory and __________ are critical in centralizing control of authentication and security policies in a domain environ
vagabundo [1.1K]

Answer:

DNS(Domain Name Services) is the correct answer.

Explanation:

DNS is the type of directory system which is distributed that finds the solution of a hostname which is readable by the human being. It is also critical in centralizing control of the confirmation and policies of the security in the environment of the domain with Active Directory. That's why the following answer is correct.

4 0
3 years ago
I will mark you Brainliest if you could guess how old i am :3
ra1l [238]

Answer:

you are 17

Explanation:

6 0
3 years ago
What is fair use?
koban [17]

Answer:

I believe its C

Explanation:

I'm sorry if its wrong...

8 0
3 years ago
Read 2 more answers
The java compiler is able to find all programmer errors.
Troyanec [42]
No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.
5 0
3 years ago
Other questions:
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • After Maya gave her friend the password to a protected website, the friend was able to remember it only long enough to type it i
    6·1 answer
  • ____ contain instructions for the OS for hardware devices, such as the keyboard, mouse, and video card, and are stored in the sy
    15·1 answer
  • Fortnite anyone? i just started tdy so dont be judgiee lol
    6·2 answers
  • Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software
    5·1 answer
  • ☢☢☢does anyone know how to do the TYNKER CANNON assignment ( lesson 2 intro to game design) I'll give BRANLIEST(¬‿¬)❤ dont answe
    11·2 answers
  • Individuals and IT professionals have a responsibility to be aware of security threats and the damage they might do.
    7·1 answer
  • Please answer the following question in Verilog.
    11·1 answer
  • Choose the answer.
    15·1 answer
  • Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!