1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
5

Is it safe to turn on a computer without ram?

Computers and Technology
2 answers:
swat323 years ago
4 0
Well, it is safe to turn a computer on without a RAM, but you can't really do it. RAM is one of the essential components in computers without which you can't really use a computer. You can turn it on, however, nothing will appear on your screen and the system won't boot. So, technically, it is safe, but it won't do anything to your computer as it cannot run without RAM.
babunello [35]3 years ago
3 0
Um yes. yes it is safe. what kind of question is this
You might be interested in
Which of the following refers to a descriptive technique involving the systematic collection of quantitative​ information? A. Lo
Nastasia [14]

Answer:

The answer is "Option C".

Explanation:

This technique is also known as walking-sectional experimental research, which only collects information at one stage. The goal of using this strategy is to create a single point, that provides representations to the population of interest, and other choices were wrong, that can be described as follows:

  • In option A, It is wrong, because this designing technique is used to search the relationship between variables.
  • In option B, It is a form of marketing, that provides communication via telephone, that's why it is incorrect.
  • In option D, It is used in research, that's why it is not correct.
  • In option E, It is wrong, because it is used in business.
6 0
3 years ago
Which of the following is considered an integrated software system? a) Material requirements planning systems (MRP I) b) Manufac
Lemur [1.5K]

Answer:

d.) all of the above

Explanation:

because they are all Integrated software systems.

3 0
4 years ago
Select the correct answer.
oee [108]

Answer:

D

Explanation:

3 0
3 years ago
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
Jeremy is the team leader of the employees planning to display the company’s new product at a big convention. He needs to be sur
Luden [163]
Assuming no options are provided, Jeremy would do well to create a weekly progress report, detailing what the company has accomplished during the week, and what remains to be accomplished. The report should be goal-based with defined deadlines, and clear explanations on what has been done and what remains to be done, and should be organized by the various aspects of the project (accounting, marketing, etc). This report will help keep his team conscience of their role within the larger project, what they have accomplished thus far, and what still needs to be done.
6 0
3 years ago
Read 2 more answers
Other questions:
  • What does editing refer to
    6·2 answers
  • A student has created a Book class. The class contains variables to represent the following.An int variable called pages to repr
    11·1 answer
  • The company database may be stored on a central database server and managed by a database adminstrator true or false
    12·1 answer
  • You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t
    5·1 answer
  • What are some reasons a person might choose to remain anonymous on the Internet?
    12·2 answers
  • How can I unblock Brainly?
    12·2 answers
  • In Marvel Comics, what imaginary rare metal is an important natural resource of Wakanda, the home country of Black Panther?
    15·1 answer
  • Write a function square_evens(values) that takes a list of integers called values, and that modifies the list so that all of its
    9·1 answer
  • Which statement best describes a social impact of computing on the world?
    9·1 answer
  • What is the term for delivering an application over the internet called?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!