1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yaroslaw [1]
3 years ago
12

A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection

against errors. What type of memory would be best suited for this?
Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
7 0

Answer: ECC memory

Explanation:Error-correcting code(ECC) memory is used for the detection as well as correction of the internal storage data in the operating system. It is the memory code that cannot tolerated any type of the corruption in the data storage.

The ECC memory is usually found in the fields like financial computing, scientific etc.It is a reliable memory and provides high protection.Thus the technician should put the ECC memory in the workstation.

You might be interested in
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
A series of dialog boxes that guides you through creation of a form or report is called a ____.
victus00 [196]

Answer:

c i think it mit be right i'm sorry if it's not ,

Explanation:

it's c or D.

4 0
2 years ago
____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small,
LiRa [457]

Answer:

d.) Service-Oriented Architecture

Explanation:

Because its definition matches

4 0
3 years ago
Lisa has had her California real estate license suspended for violations involving mobile homes under the California Business an
yan [13]

Answer:

Both A and B.

Explanation:

In the above statement, there some details of the question is missing that is options.

She has already had its California property license revoked under California Corporation and Occupations Law for breaches regarding mobile homes. So, she possibly she sent a check for mobile home payments to the State of California as well as the check was not honoured and she has participated knowingly in the sale of a mobile home.

7 0
4 years ago
What does the following code alert?
goldenfox [79]

It is just a declaration of an object variable, <em>person</em>, in JavaScript. Within a <em>person</em> object, there are key:value pairs. The code that you  shared has the following keys: name, age, and favouriteFood, whereas the values of those keys are: Mike, 25, and pizza.


There is <em>no</em> alert statement in this code snippet; therefore, it <em>will not alert </em>anything. This code contains only a variable called <em>person, </em>and that's it!

5 0
3 years ago
Read 2 more answers
Other questions:
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • Marcus just created a new folder specifically for his buisness records so he would like to move last months business transaction
    13·2 answers
  • _____ are special combinations of keys that tell a computer to perform a command.
    9·2 answers
  • Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
    9·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • When pointed over a text within a paragraph, the cursor takes the shape of a/an
    10·1 answer
  • Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.
    9·1 answer
  • We need an equals method for the Dog class. It needs to give back to the caller a boolean value indicating whether another objec
    5·1 answer
  • Will give brainliest
    8·1 answer
  • Define input hardware​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!