1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
2 years ago
13

According to chronology, arrange the steps that you need to take during the installation of a ram stick?

Computers and Technology
1 answer:
MAXImum [283]2 years ago
6 0

Answer:

first off you need to take of the screws make sure its unpluged and you open up to see the mother bored

Explanation:

You might be interested in
BRAINLIEST Which function will add a name to a list of baseball players in Python?
Tju [1.3M]

Answer: Append()

Explanation:

8 0
3 years ago
Read 2 more answers
What is HDLC flow control?​
Likurg_2 [28]
HDLC is a synchronous Data Link layer bit-oriented protocol developed by the International Organization for Standardization (ISO).
6 0
2 years ago
Does anyone play genshin impact here?
Reika [66]
Answer


NO sorry
Have a great day
6 0
3 years ago
Read 2 more answers
Why does a print document need a higher raster effect setting ?​
mario62 [17]

Answer:

gives label artwork a professional, polished look.

Explanation:

6 0
3 years ago
A shopaholic has to buy a pair of jeans , a pair of shoes l,a skirt and a top with budgeted dollar.Given the quantity of each pr
Rasek [7]

Answer:

hfjgyyitjtjjtjtj*jj*jtjtjthrhrhfhffbf

4 0
3 years ago
Other questions:
  • A(n) ____ loop executes a predetermined number of times.
    12·1 answer
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
    5·1 answer
  • 17) you need to locate an article that (1) is published by a university or proffessional association(2) is authored by clearly d
    6·1 answer
  • The function below takes one parameter: a string (date_string) containing a date in the mm/dd/year format. Complete the function
    11·1 answer
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • If you need seamless access to the OS, ________ is better.
    8·1 answer
  • What in the world is this for and how do you use it
    8·2 answers
  • In the following code: function drawCircle(radius, x, y, color) { var circle = new Circle(radius); circle.setPosition(x, y); cir
    7·1 answer
  • Write bubblesort algorithm using random programming language
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!